Loading...
Loading...
Browse all stories on DeepNewz
VisitPrimary Method Used by Mustang Panda or Twill Typhoon in Next Major Cyber Attack by End of 2025?
Phishing • 25%
Ransomware • 25%
Zero-day exploit • 25%
Supply chain attack • 25%
Reports from cybersecurity firms or government agencies detailing attack methods
FBI and DOJ Remove PlugX Malware from 4,258 U.S. Computers, Targeting China-Backed Hackers Mustang Panda and Twill Typhoon
Jan 14, 2025, 06:37 PM
The U.S. Department of Justice and the FBI, in collaboration with French law enforcement and cybersecurity firm Sekoia.io, have conducted an international operation to delete 'PlugX' malware from thousands of computers worldwide. The malware, used by China-backed hackers known as Mustang Panda and Twill Typhoon, was removed from approximately 4,258 U.S.-based computers and networks. The operation began in August 2024 and concluded on January 3, 2025. The PlugX malware, which has been in use since at least 2014, was employed to infiltrate and steal information from various targets, including U.S., European, and Asian entities, as well as Chinese dissident groups. The FBI has been notifying affected U.S. computer owners through their internet service providers about the removal of the malware.
View original story
Exploiting software vulnerabilities • 25%
Other • 25%
Insider threats • 25%
Phishing attacks • 25%
Phishing • 25%
Other • 25%
Insider threats • 25%
Exploiting software vulnerabilities • 25%
IoT device vulnerabilities • 25%
Phishing attacks • 25%
Ransomware • 25%
Other • 25%
U.S. Ports • 25%
Other Critical Infrastructure • 25%
U.S. Telecommunications • 25%
U.S. Power Grid • 25%
Malware-laden emails • 25%
Phishing attacks • 25%
Exploiting VPN vulnerabilities • 25%
Supply chain attacks • 25%
Other • 25%
Social engineering • 25%
Malware deployment • 25%
Phishing attacks • 25%
Exploiting exchange vulnerabilities • 25%
Other • 25%
Malware installation • 25%
Phishing attacks • 25%
Palo Alto Networks • 25%
FireEye • 25%
Other • 25%
CrowdStrike • 25%
Exploiting software vulnerabilities • 25%
Ransomware • 25%
Phishing • 25%
Other • 25%
Supply chain attacks • 25%
Insider threats • 25%
Zero-day vulnerabilities • 25%
Phishing attacks • 25%
Japan • 25%
United Kingdom • 25%
Germany • 25%
Australia • 25%