Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsChina-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware
China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware
Cybersecurity

China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware

•December 26, 2025
0
The Hacker News
The Hacker News•Dec 26, 2025

Companies Mentioned

Kaspersky

Kaspersky

ESET

ESET

Microsoft

Microsoft

MSFT

Apple

Apple

AAPL

Tencent

Tencent

0700

Baidu

Baidu

BIDU

Why It Matters

The operation demonstrates how state‑aligned actors can weaponize DNS infrastructure to bypass traditional defenses, raising the threat level for enterprises worldwide. Understanding these tactics is critical for protecting supply‑chain integrity and network hygiene.

Key Takeaways

  • •Evasive Panda used DNS poisoning to deliver MgBot.
  • •Campaign targeted Turkey, China, India from 2022‑2024.
  • •Attack leveraged fake software updates as lures.
  • •Custom encryption hides second‑stage payload per victim.
  • •MgBot provides extensive data exfiltration capabilities.

Pulse Analysis

DNS poisoning has re‑emerged as a potent initial‑access vector, allowing threat actors to silently redirect legitimate traffic to malicious servers. In the Evasive Panda campaign, the group compromised DNS responses for domains masquerading as popular software updaters such as SohuVA and iQIYI. By manipulating resolver answers at the ISP or router level, the attackers ensured that only targeted victims received the malicious payload, dramatically reducing noise and increasing the likelihood of successful infection.

The technical sophistication of the operation extends beyond simple redirection. After the initial DNS‑poisoned request, a lightweight loader retrieves an encrypted PNG file, which is uniquely XOR‑encrypted per victim and further protected with a hybrid DPAPI‑RC5 scheme. This dual‑layer encryption prevents static analysis and network‑based detection, while a renamed Python DLL sideloads the second‑stage code into a legitimate svchost.exe process. The final MgBot implant offers a full suite of espionage tools—keylogging, clipboard harvesting, audio capture, and credential theft—making it a valuable asset for long‑term intelligence gathering.

For defenders, the campaign underscores the need for multi‑layered DNS security, including DNSSEC deployment, strict resolver hygiene, and continuous monitoring for anomalous DNS query patterns. Organizations should also enforce application whitelisting and verify the authenticity of software updates through digital signatures. As nation‑state actors continue to refine DNS‑based delivery mechanisms, proactive network segmentation and rapid incident response become essential to mitigate the risk of stealthy, persistent threats like MgBot.

China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...