Daily Security Review
Silk Typhoon’s Fake Adobe Update: How China-Backed Hackers Target Diplomats
28 Aug 2025
A new and highly sophisticated cyber espionage campaign attributed to Silk Typhoon—also known as Mustang Panda, TEMP.Hex, or UNC6384—has been uncovered, targeting diplomats and government entities across Southeast Asia. Researchers from Google’s Threat Intelligence Group (GTIG) revealed that the attackers deployed Adversary-in-the-Middle (AitM) techniques to hijack web traffic at captive portals, redirecting victims to a malware-serving website disguised as a legitimate Adobe update page.Unsuspecting users were tricked into downloading a digitally signed installer, AdobePlugins.exe, carrying the STATICPLUGIN downloader. This malicious file was signed with a valid certificate from Chengdu Nuoxin Times Technology Co., Ltd., allowing it to bypass many endpoint defenses. Once executed, the malware chain unfolded through multiple stages of in-memory execution, culminating in the deployment of SOGU.SEC—a heavily obfuscated variant of the infamous PlugX backdoor. Capable of remote command execution, file transfer, and system surveillance, SOGU.SEC communicated with command-and-control servers over HTTPS, leaving almost no forensic trace on disk.The campaign demonstrates a sharp evolution in Chinese tradecraft, blending social engineering (fake plugin prompts), digitally signed malware, and stealthy in-memory execution to evade detection. GTIG has since blocked malicious domains, alerted affected Gmail and Workspace accounts, and urged organizations to treat Chengdu Nuoxin’s code-signing certificate as untrusted.This incident aligns with the DHS Homeland Threat Assessment 2025, which warns that the People’s Republic of China is aggressively pre-positioning on global and U.S. networks for potential disruption in future conflicts. With generative AI poised to accelerate such campaigns, the threat is growing more urgent.We’ll also discuss defensive strategies: implementing phishing-resistant MFA, conditional access policies, continuous memory inspection, code-signing validation, zero-trust architectures, and robust security awareness programs for high-risk users like diplomats and government employees.The Silk Typhoon campaign underscores a sobering reality: state-sponsored cyber actors are innovating faster than many defenses can adapt. Countering them requires not only technical resilience but also international coordination and intelligence sharing.#SilkTyphoon #MustangPanda #UNC6384 #CyberEspionage #PlugX #SOGU #AdversaryInTheMiddle #GoogleGTIG #ChineseAPT #DiplomatCyberattacks #ChengduNuoxin #CodeSigningAbuse #HomelandThreatAssessment #ZeroTrust #Cybersecurity
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
3ª PARTE | 17 DIC 2025 | EL PARTIDAZO DE COPE
01 Jan 1970
El Partidazo de COPE
13:00H | 21 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
12:00H | 21 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
10:00H | 21 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
13:00H | 20 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
12:00H | 20 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana