Chinese APT ‘Phantom Taurus’ Targets Organizations Using Net-Star Malware

Published:

spot_img

Phantom Taurus: The Covert Cyber Threat Targeting Global Organizations

Introduction to Phantom Taurus

Palo Alto Networks has unveiled a sophisticated hacking group known as ‘Phantom Taurus,’ linked to state-sponsored cyber espionage efforts originating from China. This group has been actively targeting government and telecommunications organizations for over two years, with a specific focus on high-value entities such as foreign ministries and embassies. Their operations align closely with China’s economic and geopolitical ambitions.

Emerging on the Cybersecurity Radar

First identified in 2023, Phantom Taurus initially did not seem to fit the mold of typical Chinese hacking groups due to its distinct tactics, techniques, and procedures (TTPs). However, recent investigations revealed shared infrastructure connections leading back to Chinese cyber operations, confirming its origins within that region. This group has been recognized for conducting discreet operations that provide long-term access to critical targets, allowing them to remain undetected for extended periods.

Unique Techniques and Tools

What differentiates Phantom Taurus from other advanced persistent threats (APTs) is its unique arsenal of malware tools. Notably, the group employs the Specter and Net-Star malware families, in addition to the Ntospy malware variant. Additionally, they incorporate common tools used by Chinese cyber actors, such as the China Chopper web shell and various modules from the Potato suite and Impacket. This blend of familiar and novel tools enhances their operational flexibility and effectiveness.

Targeting Strategies

Phantom Taurus’s operations have involved direct attacks on email servers and databases, with a particular emphasis on extracting sensitive communication and valuable information. Their activities have spanned across Africa, the Middle East, and Asia, showcasing a global footprint that aligns with diplomatic and military interests.

The Shift to Net-Star Malware

In 2025, Phantom Taurus began utilizing the Net-Star malware suite, specifically designed to target Internet Information Services (IIS) web servers. This suite encompasses three web-based backdoors: IIServerCore, alongside two variants of AssemblyExecuter. The IIServerCore backdoor operates entirely in memory, allowing it to execute payloads and relay the outcome back to the command-and-control (C&C) server without being written to the disk.

Functionality of the Malware

The IIServerCore backdoor is equipped with several built-in commands that facilitate operations such as file system manipulation, database access, and arbitrary code execution. Additionally, it can manage web shells, bypass security measures, and encrypt communication with its C&C server.

AssemblyExecuter Variants

The first loader, AssemblyExecuter V1, is capable of executing other .NET assemblies directly in memory, enabling attackers to dynamically introduce and execute additional code after the initial compromise. AssemblyExecuter V2 builds upon its predecessor’s capabilities, offering enhanced evasion features designed to circumvent Windows’s Antimalware Scan Interface (AMSI) and Event Tracing for Windows (ETW) security protocols.

Targeting Diplomatic and Security Operations

Palo Alto Networks has noted that Phantom Taurus has a clear interest in diplomatic communications and defense-related intelligence. The timing of their operations often coincides with significant global events and regional security issues, indicating a strategic approach to their espionage activities.

Conclusion: Understanding the Threat Landscape

The emergence of groups like Phantom Taurus serves as a stark reminder of the evolving threat landscape in cybersecurity. These covert operations are not only complex but also deeply intertwined with international relations and national security. As organizations navigate these challenges, particularly in critical sectors, awareness and preparedness must be prioritized to safeguard sensitive information against such sophisticated threats.


This exploration into Phantom Taurus sheds light on the intricacies of cyber espionage, emphasizing the need for heightened vigilance within governmental and telecommunications sectors globally.

spot_img

Related articles

Recent articles

Tailored Tech Support Scams Launch Customized Havoc on Organizations

Growing Cyber Threats: Fake IT Support and the Havoc C2 Framework Emerging Threats in Cybersecurity Recent investigations by threat hunters have unveiled a concerning trend: cybercriminals...

ES-KO at 70: Celebrating Seven Decades of Excellence in Catering, Logistics, and Facility Management in Tough Environments

ES-KO: Celebrating 70 Years of Excellence in Catering and Facility Management ES-KO, a prominent player in the fields of catering, facility management, procurement, and...

Escalating Cyber Warfare: Iran, US, and Israel Clash on Military and Digital Battlegrounds

The Evolution of Warfare: Understanding the Hybrid Conflict in the Middle East Introduction to Hybrid Warfare In recent months, the Middle East has witnessed a significant...

70% of Online Fraud Linked to Fake Trading Apps; Maharashtra, UP, and Rajasthan Identify as Mule Account Hotspots

The Rise of Online Investment Scams in India A Shift in Cybercrime Tactics In recent times, the landscape of online fraud has dramatically changed, reflecting a...