Sekoia has been monitoring a PlugX worm variant that spreads via infected USB drives, bypassing air gaps. Over the past six months, Sekoia observed over 2.5 million IP addresses connecting to a sinkholed IP linked to the worm. Currently, between 90,000 and 100,000 unique IPs still send daily requests to the sinkhole, indicating the botnet remains active without control from its operators. The worm, attributed to the China-linked threat actor Mustang Panda, was designed to exfiltrate data from networks not connected to the internet. It spreads by adding a Windows shortcut file and three DLL sideloading files to connected flash drives. When clicked, the shortcut executes the malware, which then copies itself to the system and creates a new registry key for persistence, continuing to infect connected USB drives every 30 seconds. Sekoia identified approximately 2.5 million infected hosts in over 170 countries. Most victims are in regions strategically important to China's Belt and Road Initiative. Sekoia suspects the worm was developed to gather intelligence on the initiative. While Sekoia has the capability to disinfect infected hosts and restore user files on connected USB drives, the worm might persist on drives not connected during disinfection and on air-gapped systems. Due to legal implications, Sekoia is contacting Computer Emergency Response Teams (CERTs) and law enforcement agencies in affected countries, providing them with sinkhole data and asking for guidance on whether to proceed with disinfection.
A critical XML External Entity vulnerability has been identified in the Apache Syncope identity management console, raising concerns for organizations that rely on the platform to ...
In late December 2025, a new destructive malware strain named DynoWiper was deployed in a targeted cyberattack against an energy company in Poland. Unlike financially motivated ran...
Security researchers have uncovered a malicious Android application hosted on the Google Play Store that was downloaded more than 50,000 times before being removed. The app, presen...