InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: China-linked Plugx and BookWorm Malware Attack Targets Asia Telecom and ASEAN Network
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > China-linked Plugx and BookWorm Malware Attack Targets Asia Telecom and ASEAN Network
Technology

China-linked Plugx and BookWorm Malware Attack Targets Asia Telecom and ASEAN Network

September 27, 2025 5 Min Read
Share
China-linked Plugx and BookWorm Malware Attack Targets Asia Telecom and ASEAN Network
SHARE

The telecommunications and manufacturing sectors in central and South Asian countries are emerging as the goal of an ongoing campaign to distribute new variants of known malware Plugx (Ak Korplug or Sogu).

“The new variant features overlap with both Ours and Tulian The same legal application abuse of DLL sideloads, the XOR-RC4-RTLDECOM PRESSBUFFER algorithm used to encrypt/decrypt payloads, states the backdoor using the RC4 key used by Cisco Talos researchers Joey Chen and Takahiro Takeda in this week’s analysis.

The cybersecurity company noted that the configuration associated with the Plugx variant branches significantly from the regular Plugx configuration format and instead employs the same structure used in Rainyday. It can also be attributed to a Chinese-speaking threat group called Cycldek, which Kaspersky tracks as Foundcore.

Plugx is a modular remote access trojan (rat) widely used by many Chinese hacking groups, but the most prominent Mustang Panda (aka Basin, Bronze President, Camaro Dragon, Earth Preta, Honey Mite, Red Delta, Red Rich, Zation Torus, Tempo, Twill Type).

Meanwhile, Turian (aka Bolian or Whitebird) is rated as being used only in cyber attacks targeting China.

The victim patterns – focused specifically on telecom companies – and technical malware implementations generated evidence suggesting a possible connection between Lotuspander and backdried drilling, increasing the likelihood that the two clusters are the same or are getting tools from a common vendor.

In one incident detected by the company, Nikon is said to have targeted a telecom company in Kazakhstan, a country that shares the border with Uzbekistan, previously chosen by Backdrudiprometi. Furthermore, both hacking crews are found to be zero in South Asian countries.

Attack chains are essentially used to abuse legal executables related to mobile pop-up applications, sideload malicious DLLs, and then decrypt and launch Plugx, Rainyday, and Turian payloads in memory. The recent attack wave, organized by threat actors, uses the same configuration structure as Rainyday and leaps heavily towards Plugx, which includes embedded keylogger plugins.

See also  Samsung fixes critical zero-day CVE-2025-21043 utilized in Android attacks

“While we cannot conclude there is a clear link between Naikon and Backdoordiplomacy, there are critical overlap aspects, such as target selection, encryption/decryption payload methods, encryption key reuse, and the use of tools supported by the same vendor,” says Talos. “These similarities suggest a moderate trust in the Chinese-speaking actors in this campaign.”

Mustang Panda BookWorm Malware Details

This disclosure comes as Palo Alto Networks Unit 42 shed light on the internal mechanisms of Book Worm Malware, which Mustang Panda actors have been using since 2015, giving them extensive control over the compromised systems. Advanced Rat is equipped with the ability to run any command, upload/download files, remove data, and establish permanent access.

Earlier this year, cybersecurity vendors said they had identified attacks targeting countries affiliated with the Association of Southeast Asian Countries (ASEAN) to distribute malware.

BookWorm utilizes a domain or compromised infrastructure that appears legal for C2 purposes to melt with normal network traffic. It is also known that some variants of the malware will share overlaps with Toneshell, a known backdoor related to Mustang Pana, starting late 2022.

Like Plugx and Toneshell, Bookworm’s distributed attack chain relies on DLL sideloads for payload execution, but new variations embrace the technology of wrapping shellcodes as universally unique identifier (UUID) strings that are decoded and executed.

“BookWorm is known for its unique modular architecture and allows for core functionality to be extended by loading additional modules directly from a command and control (C2) server,” said Unit 42 researcher Kyle Wilhoit. “This modularity makes static analysis more difficult because the reader module relies on other DLLs to provide specific functionality.”

See also  WhatsApp malware 'Maverick' hijacks browser sessions and targets Brazil's largest banks

“The development and adaptation of bookworms running in parallel with other imposing Taurus businesses demonstrates a long-term role in the actor’s arsenal, and also demonstrates a sustained, long-term commitment to development and use by the group.”

Share This Article
Twitter Copy Link
Previous Article There are all the things you see in Minecraft Live, including the new Nautilus and the Spear There are all the things you see in Minecraft Live, including the new Nautilus and the Spear
Next Article FBI Fire Agents say that an agent kneeling during 2020 racial justice protests FBI Fire Agents say that an agent kneeling during 2020 racial justice protests

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

ASD warns of ongoing BADCANDY attack exploiting Cisco IOS XE vulnerability
Technology

ASD warns of ongoing BADCANDY attack exploiting Cisco IOS XE vulnerability

3 Min Read
Apple warns Frent users of the fourth spyware campaign in 2025, CERT-FR confirms
Technology

Apple warns Frent users of the fourth spyware campaign in 2025, CERT-FR confirms

3 Min Read
Microsoft discovers 'whisper leak' attack that identifies AI chat topics in encrypted traffic
Technology

Microsoft discovers ‘whisper leak’ attack that identifies AI chat topics in encrypted traffic

7 Min Read
Russian IT Network
Technology

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

5 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?