Loading...
Loading...
Browse all stories on DeepNewz
VisitWhich region will be the primary target for PlugX malware attacks in 2025?
North America • 25%
Europe • 25%
Asia • 25%
Other • 25%
Reports from cybersecurity firms or FBI statements
FBI Deletes PlugX Malware From Over 4,200 US Computers, Targeting Mustang Panda and Twill Typhoon
Jan 14, 2025, 04:38 PM
The U.S. Department of Justice and the FBI, in collaboration with French law enforcement and cybersecurity firm Sekoia, have successfully deleted the PlugX malware from approximately 4,258 computers across the United States. This operation targeted a version of the malware deployed by the China-backed hacking groups known as Mustang Panda and Twill Typhoon. The malware, which has been used since at least 2014 and first observed in 2012, was designed to infect, control, and steal information from victim computers using a wormable component often spread through USB ports. The FBI obtained nine warrants in the Eastern District of Pennsylvania to authorize the deletion of the malware, with the operation concluding on January 3, 2025. At least 45,000 IP addresses in the U.S. had contacted the command-and-control server since September 2023. The PlugX malware has been used in espionage campaigns targeting U.S. victims, European and Asian governments and businesses, and Chinese dissident groups.
View original story
Other • 25%
Government • 25%
Healthcare • 25%
Financial • 25%
Financial • 25%
Healthcare • 25%
Government • 25%
Technology • 25%
Other • 25%
United States • 25%
France • 25%
United Kingdom • 25%
Japan • 25%
United Kingdom • 25%
Germany • 25%
Australia • 25%
South Korea • 25%
Other • 25%
United States • 25%
Japan • 25%
United States • 25%
Other • 25%
Japan • 25%
Philippines • 25%
Other • 25%
Australia • 25%
Germany • 25%
United Kingdom • 25%
China • 25%
India • 25%
Russia • 25%
United States • 25%
Healthcare • 25%
Retail • 25%
Government • 25%
Finance • 25%
Healthcare • 25%
Technology • 25%
Government • 25%
Financial • 25%
U.S. Ports • 25%
Other Critical Infrastructure • 25%
U.S. Telecommunications • 25%
U.S. Power Grid • 25%
Telecommunications • 25%
Government • 25%
Healthcare • 25%
Financial Services • 25%
Yes • 50%
No • 50%
No • 50%
Yes • 50%
Supply Chain Attack • 25%
Zero-Day Exploit • 25%
Ransomware • 25%
Phishing • 25%