Mustang Panda Targets Tibetan Community with DLL Side-Loading
Cyber Security News by CyberSum.net
A new phishing campaign by Mustang Panda targets the Tibetan community using a DLL side-loading technique. The attack begins with a ZIP file containing a decoy executable and a hidden DLL. The DLL, marked with file attributes to stay invisible, is loaded by the executable to deploy the final payload. The campaign uses persistence mechanisms and API hashing to evade detection.