Chinese APT ‘Phantom Taurus’ Targets Organizations Using Net-Star Malware

Published:

spot_img

Phantom Taurus: The Covert Cyber Threat Targeting Global Organizations

Introduction to Phantom Taurus

Palo Alto Networks has unveiled a sophisticated hacking group known as ‘Phantom Taurus,’ linked to state-sponsored cyber espionage efforts originating from China. This group has been actively targeting government and telecommunications organizations for over two years, with a specific focus on high-value entities such as foreign ministries and embassies. Their operations align closely with China’s economic and geopolitical ambitions.

Emerging on the Cybersecurity Radar

First identified in 2023, Phantom Taurus initially did not seem to fit the mold of typical Chinese hacking groups due to its distinct tactics, techniques, and procedures (TTPs). However, recent investigations revealed shared infrastructure connections leading back to Chinese cyber operations, confirming its origins within that region. This group has been recognized for conducting discreet operations that provide long-term access to critical targets, allowing them to remain undetected for extended periods.

Unique Techniques and Tools

What differentiates Phantom Taurus from other advanced persistent threats (APTs) is its unique arsenal of malware tools. Notably, the group employs the Specter and Net-Star malware families, in addition to the Ntospy malware variant. Additionally, they incorporate common tools used by Chinese cyber actors, such as the China Chopper web shell and various modules from the Potato suite and Impacket. This blend of familiar and novel tools enhances their operational flexibility and effectiveness.

Targeting Strategies

Phantom Taurus’s operations have involved direct attacks on email servers and databases, with a particular emphasis on extracting sensitive communication and valuable information. Their activities have spanned across Africa, the Middle East, and Asia, showcasing a global footprint that aligns with diplomatic and military interests.

The Shift to Net-Star Malware

In 2025, Phantom Taurus began utilizing the Net-Star malware suite, specifically designed to target Internet Information Services (IIS) web servers. This suite encompasses three web-based backdoors: IIServerCore, alongside two variants of AssemblyExecuter. The IIServerCore backdoor operates entirely in memory, allowing it to execute payloads and relay the outcome back to the command-and-control (C&C) server without being written to the disk.

Functionality of the Malware

The IIServerCore backdoor is equipped with several built-in commands that facilitate operations such as file system manipulation, database access, and arbitrary code execution. Additionally, it can manage web shells, bypass security measures, and encrypt communication with its C&C server.

AssemblyExecuter Variants

The first loader, AssemblyExecuter V1, is capable of executing other .NET assemblies directly in memory, enabling attackers to dynamically introduce and execute additional code after the initial compromise. AssemblyExecuter V2 builds upon its predecessor’s capabilities, offering enhanced evasion features designed to circumvent Windows’s Antimalware Scan Interface (AMSI) and Event Tracing for Windows (ETW) security protocols.

Targeting Diplomatic and Security Operations

Palo Alto Networks has noted that Phantom Taurus has a clear interest in diplomatic communications and defense-related intelligence. The timing of their operations often coincides with significant global events and regional security issues, indicating a strategic approach to their espionage activities.

Conclusion: Understanding the Threat Landscape

The emergence of groups like Phantom Taurus serves as a stark reminder of the evolving threat landscape in cybersecurity. These covert operations are not only complex but also deeply intertwined with international relations and national security. As organizations navigate these challenges, particularly in critical sectors, awareness and preparedness must be prioritized to safeguard sensitive information against such sophisticated threats.


This exploration into Phantom Taurus sheds light on the intricacies of cyber espionage, emphasizing the need for heightened vigilance within governmental and telecommunications sectors globally.

spot_img

Related articles

Recent articles

Webinar: Uncovering Suspicious APK Files in Wedding Card and Loan App Scams

The surge of malicious APK files in cyber fraud schemes, such as fake wedding invitations and instant loan applications, has become a growing concern....

Skylon Partners with COBNB to Launch COBNB+ Featuring L’Occitane en Provence Hotel Amenities

Skylon Partners with COBNB for a Luxurious Hospitality Experience in Kuala Lumpur Introduction to the New Partnership In an exciting development for the hospitality scene in...

Understanding CISA KEV: Key Insights and Tools for Security Teams

Understanding the CISA Known Exploited Vulnerability (KEV) Catalog The Cybersecurity and Infrastructure Security Agency (CISA) maintains the Known Exploited Vulnerability (KEV) catalog, a resource designed...

Dark Web Leak Sparks WFH Job Scams; Prayagraj Police Freeze ₹2 Crore in Fraudulent Funds

Rising Cybercrime in Prayagraj: A New Target Shifting Tactics of Cybercriminals In Prayagraj, the landscape of cybercrime is evolving. Previously, scammers predominantly targeted victims through enticing...