Mustang Panda Targets Tibetan Community with DLL Side-Loading

Cyber Security News by CyberSum.net
12 sources
A new phishing campaign by Mustang Panda targets the Tibetan community using a DLL side-loading technique. The attack begins with a ZIP file containing a decoy executable and a hidden DLL. The DLL, marked with file attributes to stay invisible, is loaded by the executable to deploy the final payload. The campaign uses persistence mechanisms and API hashing to evade detection.