‘Broken infrastructure and payloads may change, but the execution model persists’: Chinese hackers again target victims across Asia with new MustangPanda threat



  • Darktrace reported that Twill Typhoon (Mustang Panda) targets Asia-Pacific and Japan with updated FDMTP backdoor v3.2.5.1
  • The attackers used DLL download via phishing ZIP files with Sogou Pinyin plus malicious DLLs and impersonated Yahoo/Apple CDN traffic.
  • FDMTP collects system information, installs plugins for remote control and persistence; Researchers emphasize behavioral detection over static indicators.

Experts have warned that Chinese state-sponsored threat actors are targeting organizations across the Asia-Pacific region, as well as Japan, with an updated version of a known backdoor.

A new threat intelligence report by security researchers Darktrace found that since late September 2025, and continuing into April 2026, a hacking collective called Twill Typhoon (or Mustang Panda) has been attacking organizations, including at least one company in the financial sector, with a backdoor called FDMTP (now in version 3.2.5.1).

Leave a Comment

Your email address will not be published. Required fields are marked *