Skip to content

Chinese State-Backed Hackers Exposed: Phantom Taurus Uses Unique Malware to Target Governments

Discover the stealthy tactics of Phantom Taurus, a China-linked APT using custom malware to maintain long-term access to targets. Learn how they've shifted their focus and pose a significant global threat.

In this image I can see a monitor attached to the wall. On the screen, I can see a bird and in the...
In this image I can see a monitor attached to the wall. On the screen, I can see a bird and in the bottom left there is some text.

Chinese State-Backed Hackers Exposed: Phantom Taurus Uses Unique Malware to Target Governments

Cybersecurity experts have discovered a sophisticated Chinese state-aligned hacking group, Phantom Taurus, which has been active for over 2.5 years. The group uses unique tactics and techniques, including a previously undetected .NET malware suite named Net-Star, to maintain long-term access to targets near me.

Phantom Taurus has been focusing on foreign ministries, embassies, geopolitical events, and military operations. The group's operators are a previously undocumented Chinese state-aligned cyber espionage group, linked to long-term intelligence collection supporting the geopolitical interests of the People's Republic of China. They target governments and critical ministries across Africa, the Middle East, and Asia.

The group's custom-developed tools include the Net-Star malware suite, which targets IIS web servers. Net-Star includes three web backdoors: ISServerCore, AssemblyExecuter V1, and AssemblyExecuter V2, enabling stealthy, persistent attacks against internet-facing servers. In early 2025, the APT shifted its tactics, moving from stealing emails to targeting databases using a script named mssq.bat.

Phantom Taurus, a China-linked APT, targets government and telecom organizations for espionage using Net-Star malware. The group's unique tactics and techniques, along with its custom-developed tools, pose a significant threat to global cybersecurity. Further investigation is needed to mitigate the risks associated with this advanced persistent threat.

Read also:

Latest