Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chinese APT ‘Phantom Taurus’ Targeting Organizations With Net-Star Malware

Posted on October 1, 2025October 1, 2025 By CWS

A Chinese language state-sponsored hacking group tracked as ‘Phantom Taurus’ has been focusing on authorities and telecommunications organizations for espionage for greater than two years, Palo Alto Networks reviews.

Initially noticed in 2023, the APT was solely not too long ago linked to Chinese language hacking teams via shared infrastructure, as its techniques, methods and procedures (TTPs) differ from these usually related to menace actors working out of China.

“These allow the group to conduct extremely covert operations and keep long-term entry to essential targets,” says Palo Alto Networks.

The group, the cybersecurity agency explains, makes use of shared operational infrastructure unique to Chinese language APTs, and targets high-value organizations (reminiscent of ministries of international affairs and embassies), consistent with China’s financial and geopolitical pursuits.

What units Phantom Taurus aside, nevertheless, is the usage of a unique set of TTPs, some distinctive to the group, reminiscent of its Specter and Web-Star malware households, and the Ntospy malware. Instruments usually utilized by Chinese language hackers, reminiscent of China Chopper, the Potato suite, and Impacket, are additionally a part of its stock.

The APT has been noticed focusing on e mail servers to exfiltrate messages of curiosity, in addition to straight focusing on databases, in assaults towards organizations in Africa, the Center East, and Asia.

In 2025, the group began utilizing Web-Star, a .NET malware suite focusing on IIS internet servers, which consists of three web-based backdoors: IIServerCore (a fileless backdoor) and two AssemblyExecuter variants (.NET malware loaders).

The IIServerCore backdoor operates fully in reminiscence. It could possibly obtain and execute payloads and arguments, and might ship the end result to the command-and-control (C&C) server.Commercial. Scroll to proceed studying.

It helps built-in instructions to carry out file system operations, entry databases, execute arbitrary code, handle internet shells, evade and bypass safety options, load payloads straight in reminiscence, and encrypt communication with the C&C.

The primary malware loader, AssemblyExecuter V1, can execute different .NET assemblies in reminiscence, permitting the attackers to dynamically load and execute extra code post-compromise.

AssemblyExecuter V2 has the identical core objective, however options enhanced evasion capabilities, with devoted strategies for bypassing Home windows’s Antimalware Scan Interface (AMSI) and Occasion Tracing for Home windows (ETW) safety mechanisms.

“We noticed that the group takes an curiosity in diplomatic communications, defense-related intelligence and the operations of essential governmental ministries. The timing and scope of the group’s operations ceaselessly coincide with main world occasions and regional safety affairs,” Palo Alto Networks says.

Associated: Cybersecurity Consciousness Month 2025: Prioritizing Identification to Safeguard Important Infrastructure

Associated: Cyber Founder Recipe for Success: Clear Imaginative and prescient and Trusted Consultants

Associated: Leveraging Managed Providers to Optimize Your Menace Intelligence Program Throughout an Financial Downturn

Associated: AI Corporations Make Contemporary Security Promise at Seoul Summit, Nations Conform to Align Work on Dangers

Security Week News Tags:APT, Chinese, Malware, NetStar, Organizations, Phantom, Targeting, Taurus

Post navigation

Previous Post: Patchwork APT Using PowerShell Commands to Create Scheduled Task and Downloads Final Payload
Next Post: Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover

Related Posts

Seal Security Raises $13 Million to Secure Software Supply Chain Security Week News
Coyote Banking Trojan First to Abuse Microsoft UIA Security Week News
ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, CISA Security Week News
Data Exposure Vulnerability Found in Deep Learning Tool Keras Security Week News
Webinar Today: Why Context is a Secret Weapon in Application Security Posture Management Security Week News
Pharmaceutical Company Inotiv Confirms Ransomware Attack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark