
Mustang Panda
​​
Mustang Panda (aka Bronze President, RedDelta, HoneyMyte, TA416, Earth Preta, Stately Taurus) is a China-aligned cyber espionage group active since at least 2017 (possibly as early as 2014). Known for spear-phishing and custom malware like PlugX, Cobalt Strike, Hodur, PubLoad, MQsTTang, and ToneShell, they have targeted governments, NGOs, think tanks, religious organizations, and dissident communities worldwide. Their operations closely follow Chinese strategic interests from monitoring Tibetan and Uyghur groups, to spying on the Vatican, to collecting intel on EU policy during the Ukraine war. Mustang Panda remains highly active in 2025, running global campaigns aligned with Beijing’s geopolitical goals.
Mustang Panda
Aliases: Mustang Panda, Bronze President, RedDelta, HoneyMyte, TA416, Earth Preta, Stately Taurus, Camaro Dragon, Hive0154
​
Origin: China
Years Active: 2017 – Present
Motivation: State-sponsored espionage supporting PRC geopolitical, security, and religious policy
Primary Targets: Governments, NGOs, think tanks, minority rights groups, religious institutions, diplomatic entities, international organizations
​
Tactics, Techniques, and Procedures (TTPs)
Initial Access: Spear-phishing with LNK-in-ZIP archives, malicious Google Drive/Dropbox links, double extension tricks (.pdf.lnk)
Malware Families: PlugX/Korplug (multiple variants), Cobalt Strike Beacon, Hodur, RCSession, ORat, PUBLOAD + PubShell, MQsTTang, ToneShell/ToneIns, Hiupan USB worm
Persistence & Evasion: DLL side-loading, decoy documents, HTML smuggling, malicious router firmware (Horse Shell)
Post-Exploitation: Credential dumping (Mimikatz), network recon (AdFind, PowerView), lateral movement, data staging in encrypted RAR archives
C2: HTTP(S), custom protocols, dynamic DNS, MQTT (MQsTTang), occasionally cloud services
​
​
Notable Campaigns & Operations
2017 – Mongolia focus: Phishing U.S. think tank with Mongolian themes
2018–19 – NGOs & Asian governments: Mongolian, Indian, and NGO targets compromised at scale
2020 – RedDelta/Vatican: Hacked Catholic Church before China–Vatican deal renewal
2020 – COVID lures: Fake pandemic notices in Vietnam and SE Asia
2021 – Indonesian intelligence hack: Suspected Mustang Panda intrusion into BIN
2022 – Ukraine war espionage: Targeted EU governments and Russian orgs with conflict-themed lures
2022 – Operation SmugX: Stealth campaign against European ministries
2023 – MQsTTang & ASEAN ops: New backdoor deployed; campaigns in Slovakia, Philippines, Myanmar
2025 – Tibetan exile community: Lures tied to Dalai Lama’s 90th birthday, PubLoad malware deployed
​​
Infrastructure & IOCs
​​
<Currently Compiling >
​
Regional & Geopolitical Context
Tracks PRC priorities: Tibet, Xinjiang, Hong Kong, religion (Vatican), ASEAN neighbors, Belt & Road projects, Ukraine crisis
Focus on dissident groups and minority communities (aligned with CCP “Five Poisons” strategy)
Likely operates under PRC intelligence direction (MSS links suspected)
​​
Threat Assessment
Sophistication: Moderate–High (rapid exploit adoption, custom malware, router implants, USB worms)
​
Current Activity: Highly active as of 2025 across Asia, Europe, and North America​
Risk Profile: Governments, NGOs, religious and activist communities, critical industries connected to Chinese interest
​
References
CrowdStrike (2018–2021): “Bronze President” reports – early attribution and operations in Mongolia/NGOs.
Secureworks (2019): “Bronze President – China-Based Espionage Group Targeting NGOs and Think Tanks” (first public full profile).
Recorded Future (Insikt Group, 2020–2024): Multiple reports on RedDelta/Mustang Panda campaigns against Europe, SE Asia, Vatican.
Proofpoint (2021): TA416 phishing campaigns; new C2 tools identified.
ESET (2021, 2023): Hodur backdoor discovery (2021); MQsTTang backdoor (2023).
Trend Micro (2022): “Earth Preta” – documenting large-scale espionage + USB worm Hiupan spreading PUBLOAD.
Check Point (2020–2023): Reports on PlugX evolution and Cobalt Strike use.
Palo Alto Unit 42 (2022): Operation “SmugX” – European ministries targeted with HTML smuggling.
IBM X-Force (2021–2022): Mustang Panda campaigns tied to Belt & Road initiatives.
Positive Technologies (2022): PlugX cluster analysis in Russia/Europe.
Campaign Timeline
2014
Targets: U.S. think tank using Mongolian-themed lures
Method: Spear-phishing with malicious documents → PlugX backdoor
Impact: Early public attribution to Mustang Panda (aka Bronze President)
2018–2019
Targets: NGOs, diplomatic entities, Mongolian and Indian gov organizations
Method: Spear-phishing w/ Google Drive links + LNK droppers → PlugX, Cobalt Strike
Impact: Long-term espionage footholds in South & Central Asia
2020
Targets: Vatican and Catholic Diocese in Hong Kong
Method: Phishing with religious-themed lures → PlugX
Impact: Intelligence collected before China–Vatican diplomatic accord renewal
2020 COVID
Targets: SE Asian governments (Vietnam, Myanmar)
Method: Phishing using pandemic-related lures → PlugX & Cobalt Strike
Impact: Espionage aligned with regional COVID policy monitoring
2021
Targets: Indonesian State Intelligence Agency (BIN)
Method: Spear-phishing with PlugX loaders
Impact: Sensitive intel breach (unconfirmed, but attributed)
Hodur Malware Campaign
Targets: EU diplomats, Myanmar-based entities
Method: New PlugX variant “Hodur” deployed via phishing
Impact: Enhanced persistence + anti-analysis features
2022
Targets: EU governments, Russian research organizations
Method: LNK-in-ZIP spear-phishing → PlugX, Cobalt Strike
Impact: Intelligence gathering during Russia–Ukraine conflict
Operation SmugX
Targets: European ministries and diplomatic staff
Method: HTML smuggling + PlugX loaders
Impact: Stealthy espionage operations across Europe
Earth Preta Campaign
Targets: Global NGOs, telecoms, govs (200+ victims)
Method: PUBLOAD downloader + Hiupan USB worm spreading PlugX
Impact: Large-scale espionage; strong ASEAN focus
2023
Targets: Gov entities in Europe & Asia
Method: Custom backdoor using MQTT messaging protocol
Impact: Expanded stealth C2 techniques
ASEAN & European Operations
​ Targets: Slovakia gov network, Philippines, Myanmar NGOs
Method: PlugX + PUBLOAD infections
Impact: Espionage into regional policy + Belt & Road initiatives
Horse Shell Router Implant
Targets: Random global TP-Link routers (used as C2 nodes)
Method: Malicious firmware (Horse Shell)
Impact: Persistent hidden infrastructure for Mustang Panda ops
2023
Targets: Philippines gov, Taiwan research, Pakistan ministries, US gov contractors
Method: PlugX, MQsTTang, ToneShell/ToneIns variants
Impact: Continued alignment with PRC foreign policy interests
Tibetan Exile Community Campaign
Targets: Tibetan NGOs, Dalai Lama-linked groups
Method: PubLoad + PubShell malware via decoy documents
Impact: Monitoring of exiled communities abroad