“Infrastructure changes and payloads may change, but the execution model persists”: Chinese hackers return to target victims across Asia with new MustangPanda threat


  • Darktrace reported Typhoon Twill (Mustang Panda) targeting Asia-Pacific and Japan with FDMTP backdoor update v3.2.5.1.
  • The attackers used DLL sideloading via spear phishing ZIPs with Sogou Pinyin and malicious DLLs, and impersonated Yahoo/Apple CDN traffic.
  • FDMTP gathers system information, installs plugins for remote control and persistence; researchers emphasize behavioral detection rather than static indicators

Chinese state-sponsored threat actors are targeting organizations in the Asia-Pacific region, as well as Japan, with an updated version of a known backdoor, experts have warned.

A new threat intelligence report by security researchers Darktrace revealed that in late September 2025 and continuing through April 2026, a hacker collective called Twill Typhoon (or Mustang Panda) targeted organizations – including at least one company in the financial sector – with a backdoor called FDMTP (now at version 3.2.5.1).

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top