#UNC6384

2025-11-03

UNC6384 Weaponizes ZDI-CAN-25373 Vulnerability to Deploy PlugX Against Hungarian and Belgian Diplomatic Entities
#UNC6384 #ZDI_CAN_25373 #CanonStager
arcticwolf.com/resources/blog/

2025-10-31

China-linked UNC6384 group targets European diplomats via spear-phishing & PlugX malware.
Attack exploited Windows flaw ZDI-CAN-25373.
Full story ๐Ÿ‘‰ technadu.com/china-linked-hack

#CyberSecurity #APT #PlugX #UNC6384 #CyberEspionage

China-Linked Hacking Group Targets European Diplomatic Entities in Espionage Campaign
๐™ฝ๐™ด๐šƒ๐š๐™ด๐š‚๐™ด๐™ฒnetresec@infosec.exchange
2025-08-27

Googleโ€™s report on #UNC6384 lists this certificate as being used in C2 comms by Sogu (#PlugX variant):
eca96bd74fb6b22848751e254b6dc9b8e2721f96

Hereโ€™s an @anyrun_app execution, of AdobePlugins.โ€‹exe on May 19, which runs CANONSTAGER as well as SOGU.โ€‹SEC:
app.any.run/tasks/ce2745eb-eda

It connects to the C2 server on 166.88.2[.]90, which actually provides a different certificate.
๐Ÿ”ฅ 50f990235d7492431f57953cec14a478fb662c8d
๐Ÿ”ฅ SAN: *.crossfitolathe.โ€‹com

PCAP file from https://app.any.run/tasks/ce2745eb-edac-4e62-b5a9-5d9515b88bc4 loaded in NetworkMiner 3.0 showing parameters extracted from frame 2775.

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst