PULSE NAME
Before the Proxy: Uncovering Active PlugX Staging Infrastructure Linked to Three PRC Actors
WHITE Mustang Panda PetrP.73 2026-03-11 Modified: 2026-04-10
16
IOCs
MEDIUM VOLUME
Recent investigations into PlugX malware have uncovered a network of 14 domains linked to Chinese state-sponsored threat actors, particularly Mustang Panda, UNC6384, and RedDelta. These domains form part of a sophisticated espionage campaign targeting government and diplomatic entities. The command and control (C2) operator behind this campaign exhibits a methodical approach, typically registering expired domains and transitioning them to virtual private servers (VPS) with the ASN 149440, associated with Evoxt Enterprise, before obfuscating the infrastructure through Cloudflare.
Indicators of Compromise (1 / 16 total)
All URL domain
TYPEINDICATORDESCRIPTIONCREATED
URL http://108.165.255.97:443 2026-03-11