Article Details
Scrape Timestamp (UTC): 2025-10-01 03:06:13.059
Source: https://www.theregister.com/2025/10/01/phantom_taurus_apt/
Original Article Text
Click to Toggle View
Beijing-backed burglars master .NET to target government web servers. ‘Phantom Taurus’ created custom malware to hunt secrets across Asia, Africa, and the Middle East. Threat-hunters at Palo Alto Networks’ Unit 42 have decided a gang they spotted two years ago is backed by China, after seeing it sling a new variety of malware. Unit 42 first spotted this cluster of attackers in 2022 and has kept an eye on it ever since. On Tuesday the infosec investigators decided the group is worthy of a name – “Phantom Taurus” – because it has developed novel tactics, techniques, and procedures (TTPs) in pursuit of military and diplomatic targets across Asia, the Middle East, and Africa. “We observed that the group takes an interest in diplomatic communications, defense-related intelligence and the operations of critical governmental ministries,” the researchers wrote, and noted the group’s ops align with China’s interests and “frequently coincide with major global events and regional security affairs.” Unit 42 says the group first targeted email systems, then switched to attacks on databases by using stolen credentials. Those efforts saw Phantom Taurus employ infrastructure used by other China-linked gangs, namely Iron Taurus (aka APT27), Starchy Taurus (aka Winnti) and Stately Taurus (aka Mustang Panda). Phantom Taurus now uses its own infrastructure, and its very own malware that Unit 42 named “NET-STAR” because it’s a .NET app and is designed to target Internet Information Services (IIS) web servers. “The NET-STAR malware suite demonstrates Phantom Taurus’ advanced evasion techniques and a deep understanding of .NET architecture, representing a significant threat to internet-facing servers,” the threat hunters wrote, before explaining the suite includes three backdoors: Unit 42 thinks Phantom Taurus designed the payloads to confuse infosec researchers, and that their efforts are working because AssemblyExecuter V1has a “seemingly benign code structure” that “results in minimal flagging by antivirus engines on VirusTotal.” Palo Alto’s article includes indicators of compromise – you’ll need to go looking for SHA256 hashes for the three backdoors – and suggests Phantom Taurus is “a significant threat to internet-facing servers.” However, the company’s post doesn’t detail how Phantom Taurus infects its targets with NET-STAR, or describe any raids it has conducted other than to say it’s observed the gang seeking “documents of interest and information related to specific countries such as Afghanistan and Pakistan.” China consistently refutes reports that it backs attack gangs, claiming that they’re all part of a US-led plot to discredit it and sully its peaceful intentions.
Daily Brief Summary
Palo Alto Networks' Unit 42 identified Phantom Taurus, a China-backed group, using custom malware to target government servers across Asia, Africa, and the Middle East.
Phantom Taurus, active since 2022, focuses on diplomatic communications and defense intelligence, aligning with China's strategic interests.
The group employs the NET-STAR malware suite, a .NET-based tool targeting Internet Information Services (IIS) web servers, demonstrating advanced evasion techniques.
Initially leveraging infrastructure from other China-linked groups, Phantom Taurus now uses its own, indicating increased operational independence.
The malware suite includes three backdoors, designed to evade detection, with minimal antivirus flagging, complicating threat detection efforts.
Indicators of compromise, such as SHA256 hashes, have been shared to aid in identifying and mitigating threats posed by Phantom Taurus.
China's government denies involvement, attributing such accusations to geopolitical tensions and disinformation campaigns.