Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsChinese Mustang Panda Hackers Deploy Infostealers via CoolClient Backdoor
Chinese Mustang Panda Hackers Deploy Infostealers via CoolClient Backdoor
Cybersecurity

Chinese Mustang Panda Hackers Deploy Infostealers via CoolClient Backdoor

•January 27, 2026
0
BleepingComputer
BleepingComputer•Jan 27, 2026

Why It Matters

The enhancements enable more stealthy credential harvesting and broader persistence, raising the threat level for critical infrastructure worldwide. Defenders must adapt detection to the new multi‑stage, encrypted payloads.

Key Takeaways

  • •CoolClient adds clipboard monitoring and window title tracking.
  • •Deploys three browser‑specific infostealer families for Chromium browsers.
  • •Uses hard‑coded tokens to exfiltrate via Google Drive, Pixeldrain.
  • •Expands plugins: remote shell, service management, advanced file handling.
  • •Targets governments in five countries via Sangfor software.

Pulse Analysis

Mustang Panda’s evolution illustrates how state‑aligned cyber‑espionage groups continuously refine their toolsets to bypass traditional defenses. By integrating infostealer modules that harvest credentials from Chrome, Edge and other Chromium‑based browsers, the latest CoolClient variant shifts from pure remote access to proactive data exfiltration. The use of hard‑coded API tokens for public cloud services such as Google Drive further obscures network traffic, making signature‑based detection increasingly ineffective.

From a technical standpoint, CoolClient’s multi‑stage execution leverages encrypted .DAT files, registry persistence, scheduled tasks and UAC bypass techniques. New plugins extend operational flexibility: a remote‑shell plugin spawns hidden cmd.exe sessions, a service‑management module manipulates Windows services, and an advanced file‑management component supports drive enumeration, ZIP compression and network‑drive mapping. Clipboard monitoring and active window title tracking add real‑time intelligence, while HTTP proxy credential sniffing taps raw packet streams, broadening the attack surface beyond browsers.

The geopolitical reach of these attacks—spanning Myanmar, Mongolia, Malaysia, Russia and Pakistan—highlights the strategic intent to compromise critical infrastructure across diverse regions. Security teams should prioritize threat‑intel sharing, enforce strict application whitelisting, and monitor for anomalous API calls to cloud storage endpoints. Deploying behavioral analytics that flag unusual file‑system activity, service modifications, or unexplained clipboard access can help mitigate the risk posed by this increasingly sophisticated backdoor.

Chinese Mustang Panda hackers deploy infostealers via CoolClient backdoor

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...