ESET researchers have uncovered a new backdoor called MQsTTang, which is being used by a notorious Chinese hacking group known as Mustang Panda. The backdoor utilizes the MQTT protocol to communicate and carry out malicious activities.
MQsTTang is the latest addition to a growing list of sophisticated hacking tools and techniques employed by advanced persistent threat (APT) groups. Mustang Panda, a group notorious for its cyber espionage campaigns, has been active since at least 2018, primarily targeting the healthcare, government, and educational sectors in South Asia.
The MQTT protocol, short for Message Queuing Telemetry Transport, is a lightweight communication protocol commonly used in IoT (Internet of Things) devices. This protocol allows devices to send and receive messages efficiently, making it an attractive choice for malicious actors who seek to gain unauthorized access to a network.
What sets MQsTTang apart from previously observed espionage tools is its ability to bypass traditional network defenses. The backdoor is designed to avoid detection by operating under a radar, disguising itself as legitimate MQTT packets.
Once inside a target network, MQsTTang establishes a command-and-control (C&C) infrastructure that allows the attacker to remotely control compromised devices. This makes it possible for the hackers to exfiltrate sensitive data, gather intelligence, and even deploy additional malware within the network.
The ESET researchers have identified multiple variants of MQsTTang, reflecting Mustang Panda’s ever-evolving tactics. Each variant of the backdoor has its own unique characteristics, making it challenging for security solutions to detect and mitigate its effects.
To establish a connection with its C&C server, MQsTTang uses a technique that involves hiding the IP address of the server within the payload of legitimate MQTT packets. This enables the backdoor to bypass traditional firewall rules that focus on IP-based filtering.
According to the researchers, Mustang Panda has been working diligently to improve the stealthiness of MQsTTang. The group has incorporated various anti-analysis techniques, such as code obfuscation and encryption, to make it harder for security researchers to reverse engineer the backdoor and understand its inner workings.
Furthermore, MQsTTang utilizes a modular architecture, allowing attackers to add or remove functionalities as needed. The modular design allows the hackers to customize the backdoor’s capabilities for specific targeted environments, thereby increasing its effectiveness in compromising the desired networks.
ESET researchers believe that Mustang Panda is likely to continue using MQsTTang in their future campaigns, as the backdoor provides them with a powerful tool for conducting cyber espionage operations. The group’s primary targets, particularly in South Asia, should remain vigilant and take appropriate measures to protect their networks and sensitive data.
Organizations can guard against the threat posed by MQsTTang by adopting a multi-layered approach to cybersecurity. This should include implementing strong network access controls, continuously monitoring network traffic for anomalous behavior, and keeping security solutions up to date.
As the cybersecurity landscape continues to evolve, it is crucial for both organizations and cybersecurity researchers to stay informed about the latest threats and tactics employed by APT groups like Mustang Panda. Collaborative efforts between the private sector, government agencies, and security vendors are key to understanding and mitigating these advanced threats that pose significant risks to national security and critical infrastructure.

