Mustang Panda Targets Tibetan Community in Cyber Espionage Campaign
Overview of the Threat Actor
A recent investigation by IBM X-Force has attributed a new cyber espionage campaign to a group known as Mustang Panda, particularly focusing on the Tibetan community. This attack highlights the ongoing threat landscape shaped by geopolitics and the use of digital tactics for espionage.
Tactics and Techniques Used
The attackers employed spear-phishing tactics, particularly around sensitive topics related to Tibet. Notable lures included the 9th World Parliamentarians’ Convention on Tibet (WPCT), discussions on China’s educational policies in the Tibet Autonomous Region (TAR), and a new publication by the 14th Dalai Lama. These themes made the emails appear legitimate, increasing the likelihood that recipients would fall for the traps.
Phishing and Malware Deployment
The successful attacks involved the distribution of malicious archives disguised as innocuous Microsoft Word files. These included content from Tibetan websites, articles, and images from the WPCT before leading recipients to execute harmful software. The malicious payload originates from what’s known as a malicious archive, which then deploys PUBLOAD, a malware variant linked to Mustang Panda.
Breakdown of Malware Functionality
Among the technical details uncovered, the campaign used DLL side-loading to execute a malicious DLL, referred to as Claimloader. Once operational, Claimloader connects to a remote server to fetch a secondary payload called Pubshell.
The Role of Pubshell
Pubshell acts as a light-weight backdoor, providing threat actors with immediate access to infected machines. Researchers Golo Mühr and Joshua Chung noted that the implementation of Pubshell allows a reverse shell, which gives attackers remote control to execute commands on the compromised device.
Naming Conventions in Malware Tracking
It’s essential to highlight that naming conventions for malware can vary across different cybersecurity entities. IBM refers to the custom stager as Claimloader, while other organizations, like Trend Micro, may label both the stager and downloader as PUBLOAD. Such differences can lead to confusion in understanding the malware’s full scope.
Historical Context and Recent Activity
This campaign comes on the heels of other notable activity attributed to the same group, Hive0154, which has targeted entities in places like the United States, Philippines, Pakistan, and Taiwan from late 2024 into early 2025. Similar methods involving weaponized files have persistently been directed at military and diplomatic targets.
Malicious Links and Download Mechanism
The spear-phishing emails contained links to Google Drive that, when clicked, would download compromised ZIP or RAR files, thereby executing TONESHELL in 2024 and introducing PUBLOAD in the current year via Claimloader. TONESHELL serves a function akin to Pubshell, creating a reverse shell and allowing for command execution on the compromised machine.
Comparisons Between Malware Types
While both PUBLOAD and Pubshell serve to establish reverse shells, they exhibit differences in operation. For instance, Pubshell requires an additional command to return results, contrasting with TONESHELL’s design. The two share code overlaps while operating as somewhat simplified variants of each other.
Targeted USB Attacks
The cyber offensive against Taiwan involved using USB worms like HIUPAN (also known as MISTCLOAK or U2DiskWatch) to propagate Claimloader and PUBLOAD through USB devices. This USB-based distribution further emphasizes the diverse tactics employed by Mustang Panda.
Conclusion: Continuing Threat Landscape
Mustang Panda, or Hive0154, remains a formidable threat actor with multiple active sub-clusters. As they continue to refine their malware arsenal and focus on individuals and organizations in East Asia, this campaign underscores the intricate relationship between cyber activities and global issues. Cybersecurity professionals and organizations must remain vigilant, adapting their defenses to counter the sophisticated tactics employed by these adversaries.
For the latest updates and more in-depth analysis, follow us on Twitter and LinkedIn.


