Close Menu
AI Security Weekly
  • Artificial Intelligence
  • Cybersecurity
  • Threats & Breaches
  • Privacy & Policy
  • Tools
  • Trends & Research
  • MSP MSSP
  • Blogs & Insights

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Crafting a Robust SOC Automation Plan

May 15, 2025

SoundCloud CEO Addresses Concerns About AI Policy

May 15, 2025

Cybersecurity Sector Secures $1.7 Billion for Advanced Protection Innovations

May 15, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
AI Security WeeklyAI Security Weekly
Subscribe
  • Artificial Intelligence
  • Cybersecurity
  • Threats & Breaches
  • Privacy & Policy
  • Tools
  • Trends & Research
  • MSP MSSP
  • Blogs & Insights
AI Security Weekly
Home » RedDelta Unleashes PlugX Malware in Espionage Efforts Targeting Mongolia and Taiwan
Threats and Breaches

RedDelta Unleashes PlugX Malware in Espionage Efforts Targeting Mongolia and Taiwan

ContributorBy ContributorApril 28, 2025No Comments2 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Reddelta unleashes plugx malware in espionage efforts targeting mongolia and
Share
Facebook Twitter LinkedIn Pinterest Telegram Email

Jan 10, 2025Ravie LakshmananCyber Espionage / Cyber Attack

Targeted Nations and Malicious Activities

Between July 2023 and December 2024, the RedDelta threat group, associated with China, launched attacks on Mongolia, Taiwan, Myanmar, Vietnam, and Cambodia, delivering a modified version of the PlugX backdoor.

Deceptive Tactics Utilized

The group employed various lure documents related to significant events, such as the 2024 Taiwanese presidential candidate Terry Gou, Vietnam’s National Holiday, and Mongolia’s flood protection measures, as well as invitations to an ASEAN meeting, according to analysis from Recorded Future’s Insikt Group.

Notable Breaches

Monitoring indicates that RedDelta successfully breached the Mongolian Ministry of Defense in August 2024 and the Communist Party of Vietnam in November 2024. Additionally, they targeted entities in Malaysia, Japan, the United States, Ethiopia, Brazil, Australia, and India from September to December 2024.

Background on the Threat Actor

RedDelta, active since 2012, is a state-sponsored group from China known by several names in the cybersecurity community, including BASIN, Bronze President, and Mustang Panda. The group is recognized for continually enhancing its malware delivery methods.

Evolving Infection Strategies

Recent RedDelta campaigns have featured infection tactics that utilize Visual Studio Code tunnels, a method adopted by various espionage efforts linked to China. The initial stages of their attacks often involve spear-phishing with Windows Shortcut, Installer, and Management Console files to initiate the infection process, culminating in the deployment of PlugX.

Proxying Techniques for Evasion

In a notable shift, RedDelta has been observed using Cloudflare’s content delivery network to mask its command-and-control (C2) communications, integrating into regular CDN traffic to evade detection. Recorded Future tracked 10 administrative servers connecting with known RedDelta C2 servers, all registered under China Unicom in Henan Province.

Focus on Strategic Priorities

The activities of RedDelta align closely with Chinese strategic objectives, zeroing in on governments and diplomatic entities within Southeast Asia, Mongolia, and Europe. Their recent targeting of Mongolia and Taiwan mirrors previous actions against perceived threats to the Chinese Communist Party’s authority, reflecting a return to earlier operational focuses after a detour towards European targets in 2022.

Efforts Espionage Malware Mongolia PlugX RedDelta Taiwan Targeting Unleashes
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
contact
Contributor

Related Posts

Essential Insights on Cybersecurity Threats, Tools, and Best Practices

May 5, 2025

Essential Cybersecurity Threats, Strategies, and Insights

May 5, 2025

Old D-Link Vulnerabilities Open Doors for Global Attacks by FICORA and Kaiten Botnets

May 2, 2025

Targets in Russia Exceed 80% Success Rate

May 2, 2025

Treasury Cyber Attack: Ongoing Investigation with Limited Federal Impact

May 1, 2025

U.S. Sanctions Chinese Cybersecurity Firm Linked to Treasury Hack

April 27, 2025

Comments are closed.

Top Reviews
We're Social
  • Facebook
  • Twitter
  • Instagram
  • LinkedIn
Editors Picks

Crafting a Robust SOC Automation Plan

May 15, 2025

SoundCloud CEO Addresses Concerns About AI Policy

May 15, 2025

Cybersecurity Sector Secures $1.7 Billion for Advanced Protection Innovations

May 15, 2025

Creating a Trust Layer for AI and Web3: Insights from Polyhedra

May 15, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

About Us
About Us

At AI Security Weekly, we are dedicated to delivering the latest news, insights, and analysis on artificial intelligence security. As AI technologies continue to evolve, so do the threats, vulnerabilities, and solutions that shape the cybersecurity landscape. Our mission is to keep security professionals, researchers, and tech enthusiasts informed about the rapidly changing world of AI-driven security risks and defenses.

Trends

Crafting a Robust SOC Automation Plan

May 15, 2025

Sophos Launches MSP Elevate to Drive Partner Success

May 15, 2025

ManageEngine Unveils AI Innovations for Enhanced PAM Solutions

May 11, 2025
Don't Miss

Crafting a Robust SOC Automation Plan

May 15, 2025

SoundCloud CEO Addresses Concerns About AI Policy

May 15, 2025

Cybersecurity Sector Secures $1.7 Billion for Advanced Protection Innovations

May 15, 2025
© 2025 AI Security Weekly. All Rights Reserved.
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.