Mustang Panda, Bronze President

Description

(CrowdStrike) In April 2017, CrowdStrike Falcon Intelligence observed a previously unattributed actor group with a Chinese nexus targeting a U.S.-based think tank. Further analysis revealed a wider campaign with unique tactics, techniques, and procedures (TTPs). This adversary targets non-governmental organizations (NGOs) in general, but uses Mongolian language decoys and themes, suggesting this actor has a specific focus on gathering intelligence on Mongolia. These campaigns involve the use of shared malware like Poison Ivy or PlugX.

Recently, Falcon Intelligence observed new activity from Mustang Panda, using a unique infection chain to target likely Mongolia-based victims. This newly observed activity uses a series of redirections and fileless, malicious implementations of legitimate tools to gain access to the targeted systems. Additionally, Mustang Panda actors reused previously-observed legitimate domains to host files.

Also see CeranaKeeper and RedDelta.

Names

NameName-Giver
Mustang PandaCrowdStrike
Bronze PresidentSecureWorks
TEMP.HexFireEye
HoneyMyteKaspersky
Red LichPWC
Earth PretaTrend Micro
Camaro DragonCheck Point
PKPLUGPalo Alto
Stately TaurusPalo Alto
Twill TyphoonMicrosoft
Hive0154IBM

Country

State-sponsored

Motivation

  • Information theft and espionage

First Seen

2012

Observed Sectors

Observed Countries

Tools

Operations

Information

Mitre Attack

Playbook

Other Information

Uuid

d8fa62d2-de5c-4c13-8cdf-6428d02bc4d6

Last Card Change

2025-06-28