Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Samsung showed me its secret HDR10+ Advanced TV samples – and I’m almost sold

    November 8, 2025

    Starbucks barista’s side hustle brings in $1 million a month

    November 8, 2025

    A new Chinese AI model claims to outperform GPT-5 and Sonnet 4.5 – and it’s free

    November 8, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Chinese Apt Group Phantom Taurus Targets Goav and Telecom Organization
    Security

    Chinese Apt Group Phantom Taurus Targets Goav and Telecom Organization

    PineapplesUpdateBy PineapplesUpdateOctober 2, 2025No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Chinese Apt Group Phantom Taurus Targets Goav and Telecom Organization
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Chinese Apt Group Phantom Taurus Targets Goav and Telecom Organization

    Researchers have documented an already an unknown threat an actor who aligns with the interests of China’s intelligence collection. The group mainly targets government and telecom organizations from Africa, Middle East and Asia, which is with the goal of maintaining long -term secret access to important systems.

    In the last two years, researchers at Palo Alto Network have investigated separate groups of malicious activity that have now been held responsible for the same group: Phantom TaurusEarlier, the company tracked these attacks under temporary names, such as CL-STA-0043, TGR-STA-0043, or Operating diplomatic audience,

    Researchers wrote in their new report, “Our comments suggest that the main focus areas of Phantom Taurus include the Ministries of Foreign Affairs, Embassies, Geophysical events and Military Operations.” “The primary purpose of the group is espionage. Its attacks are secret, firmness and the ability to quickly adapt their strategy, techniques and processes (TTPs).”

    The part of the broad toolset of the group of custom-developed malware tools includes a suit of the Microsoft Internet Information Services (IIS) web servers. Other devices include in-memory visual basic script implants, a malware family called a speaker, including tunnelspector DNS tunling program and sweetspector remote access trojan, agent rackoon, plugx, GH 0 stem, China chopper, mimiches, mimicacities, efforts and many other double-utilities and many other double-u-utilities and system.

    A change in strategy

    Earlier, Phantom Taurus had focused on harvesting of mailboxes of interest from the exchange server, which was compromised using known weaknesses such as Proxilogone (CVE-2021-26855) and Proxisel (CVE-2021-34473). But this year researchers noticed that the attackers started searching and extracting data from the SQL database.

    The group uses Windows Management Instrumentation (WMI) tool to execute a script mssq.bat It connects to a SQL database sa (System Administrator) ID with the first password received by the attackers. This then makes a dynamic discovery for specific keywords specified in the script, saving the results as the CSV file.

    Researchers said, “The danger actor used this method to search for interest and information related documents from specific countries like Afghanistan and Pakistan.”

    Net-star malware suite

    This year is a set of a new web-based backdoor for a new web-based backdoor for the toolset of Phantom Torus designed to interact with the IIS web server.

    The main component, called IISERVERCORE, operates within the memory of the W3wp.exe IIS process and is capable of loading other fileless payloads directly into memory, performing arbitrary command and command-line arguments.

    Researchers wrote, “The initial component of Iiservercore is the ASPX web shell named Outlooken.aspx.” “This web shell contains an embedded base 64-Compressed binary, Iiservercore tackdoor. When the web shell is executed, it loads the backdor in memory w3wp.exe Invites the process and the run method, which is the main function of Iiservercore. ,

    Another component, called the assembly V1, is designed to execute the .NET assembly bitecode in memory, while extended version, assembled, is capable of adorning the event trading for the assembly V2, Antimailware Scan Interface (AMSI) and Windows (ETW).

    Researchers said, “The result of the gentle code structure appearing for the component is in the minimum flag by the antivirus engine on the virusotal at the time of writing this article,” the researchers said. “It shows a technique that actor of danger can use to create devices that avoid overt codes that can interpret the detection system malicious.”

    Phantom Taurus uses APT operational infrastructure especially in the Phantom Taurus past in the past that contains APT operations associated with other Chinese danger actors, such as Iron Taurus (aka APT 27), Starchi Taurus (aka Winnant), and luxurious Taurus (aka Mustang Panda). However, the components of the specific infrastructure used by Phantom Taurus have not been observed with other groups, suggesting that it is a separate group that reduces its operation.

    Apt Chinese Goav group Organization Phantom Targets Taurus Telecom
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleI wore Apple’s $ 60 iPhone crossbody strap for a week – here is now my purchase advice
    Next Article Visa Crackdown is blocking the dreams of the students’ studies and abroad, so India’s leverage Edu is rebuilding them
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    A new Chinese AI model claims to outperform GPT-5 and Sonnet 4.5 – and it’s free

    November 8, 2025
    AI/ML

    Copilot is getting more personality with ‘real conversations’ mode and group chats

    October 23, 2025
    Security

    Your Uber driver has a new endeavor: training an AI for cash

    October 18, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    Samsung showed me its secret HDR10+ Advanced TV samples – and I’m almost sold

    November 8, 2025

    Starbucks barista’s side hustle brings in $1 million a month

    November 8, 2025

    A new Chinese AI model claims to outperform GPT-5 and Sonnet 4.5 – and it’s free

    November 8, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.