Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks

Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks

Posted on January 28, 2026January 28, 2026 By CWS

Risk actors with ties to China have been noticed utilizing an up to date model of a backdoor known as COOLCLIENT in cyber espionage assaults in 2025 to facilitate complete information theft from contaminated endpoints.
The exercise has been attributed to Mustang Panda (aka Earth Preta, Fireant, HoneyMyte, Polaris, and Twill Storm) with the intrusions primarily directed in opposition to authorities entities situated throughout campaigns throughout Myanmar, Mongolia, Malaysia, and Russia.
Kaspersky, which disclosed particulars of the up to date malware, mentioned it is deployed as a secondary backdoor together with PlugX and LuminousMoth infections.
“COOLCLIENT was sometimes delivered alongside encrypted loader recordsdata containing encrypted configuration information, shellcode, and in-memory next-stage DLL modules,” the Russian cybersecurity firm mentioned. “These modules relied on DLL side-loading as their major execution methodology, which required a professional signed executable to load a malicious DLL.”

Between 2021 and 2025, Mustang Panda is claimed to have leveraged signed binaries from numerous software program merchandise, together with Bitdefender (“qutppy.exe”), VLC Media Participant (“vlc.exe” renamed as “googleupdate.exe”), Ulead PhotoImpact (“olreg.exe”), and Sangfor (“sang.exe”) for this goal.

Campaigns noticed in 2024 and 2025 have been discovered to abuse professional software program developed by Sangfor, with one such wave concentrating on Pakistan and Myanmar utilizing it to ship a COOLCLIENT variant that drops and executes a beforehand unseen rootkit.
COOLCLIENT was first documented by Sophos in November 2022 in a report detailing the widespread use of DLL side-loading by China-based APT teams. A subsequent evaluation from Development Micro formally attributed the backdoor to Mustang Panda and highlighted its capability to learn/delete recordsdata, in addition to monitor the clipboard and energetic home windows.
The malware has additionally been put to make use of in assaults concentrating on a number of telecom operators in a single Asian nation in a long-running espionage marketing campaign which will have commenced in 2021, Broadcom’s Symantec and Carbon Black Risk Hunter Crew revealed in June 2024.

COOLCLIENT is designed for accumulating system and consumer info, resembling keystrokes, clipboard contents, recordsdata, and HTTP proxy credentials from the host’s HTTP visitors packets primarily based on directions despatched from a command-and-control (C2) server over TCP. It will possibly additionally arrange a reverse tunnel or proxy, and obtain and execute further plugins in reminiscence.
A number of the supported plugins are listed under –

ServiceMgrS.dll, a service administration plugin to supervise all providers on the sufferer host
FileMgrS.dll, a file administration plugin to enumerate, create, transfer, learn, compress, search, or delete recordsdata and folders
RemoteShellS.dll, a distant shell plugin that spawns a “cmd.exe” course of to permit the operator to concern instructions and seize the ensuing output

Mustang Panda has additionally been noticed deploying three totally different stealer applications as a way to extract saved login credentials from Google Chrome, Microsoft Edge, and different Chromium-based browsers. In not less than one case, the adversary ran a cURL command to exfiltrate the Mozilla Firefox browser cookie file (“cookies.sqlite”) to Google Drive.
These stealers, detected in assaults in opposition to the federal government sector in Myanmar, Malaysia, and Thailand, are suspected for use as a part of broader post-exploitation efforts.

Moreover, the assaults are characterised by way of a identified malware known as TONESHELL (aka TOnePipeShell), which has been employed with various ranges of capabilities to ascertain persistence and drop further payloads like QReverse, a distant entry trojan with distant shell, file administration, screenshot seize, and knowledge gathering options, and a USB worm codenamed TONEDISK.
Kaspersky’s evaluation of the browser credential stealer has additionally uncovered code-level similarities with a cookie stealer utilized by LuminousMoth, suggesting some degree of software sharing between the 2 clusters. On high of that, Mustang Panda has been recognized as utilizing batch and PowerShell scripts to collect system info, conduct doc theft actions, and steal browser login information.
“With capabilities resembling keylogging, clipboard monitoring, proxy credential theft, doc exfiltration, browser credential harvesting, and large-scale file theft, HoneyMyte’s campaigns seem to go far past conventional espionage targets like doc theft and persistence,” the corporate mentioned.
“These instruments point out a shift towards the energetic surveillance of consumer exercise that features capturing keystrokes, accumulating clipboard information, and harvesting proxy credentials.”

The Hacker News Tags:Attacks, Backdoor, CoolClient, Cyber, Deploys, Government, Mustang, Panda, Updated

Post navigation

Previous Post: Chrome Security Update Patches Background Fetch API Vulnerability
Next Post: From Triage to Threat Hunts: How AI Accelerates SecOps

Related Posts

Malicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025 Malicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025 The Hacker News
Why IT Leaders Must Rethink Backup in the Age of Ransomware Why IT Leaders Must Rethink Backup in the Age of Ransomware The Hacker News
Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials The Hacker News
BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. The Hacker News
MS Teams Hack, MFA Hijacking, B Crypto Heist, Apple Siri Probe & More MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More The Hacker News
AI’s Impact on Cybersecurity Response Times AI’s Impact on Cybersecurity Response Times The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark