‘Infrastructure rotates and payloads may change, but execution model persists’: Chinese hackers return to target victims across Asia with new MustangPanda threat


  • Darktrace reported Twill Typhoon (Mustang Panda) targeting Asia-Pacific and Japan with updated FDMTP backdoor v3.2.5.1
  • Attackers used DLL sideloading via spear-phished ZIPs with Sogou Pinyin plus malicious DLL and mimicked Yahoo/Apple CDN traffic
  • FDMTP collects system info, installs plugins for remoting and persistence; researchers emphasize behavioral detection over static indicators

Chinese state-sponsored threat actors are targeting organizations across the Asia-Pacific region as well as Japan with an updated version of a known backdoor, experts have warned.

A new threat intelligence report from security researchers Darktrace found in late September 2025, and all the way through April 2026, a hacker collective called Twill Typhoon (or Mustang Panda) has been targeting organizations — including at least one financial sector company — with a backdoor called FDMTP (now in version 3.2.5.1).

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top