Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts tagged with: PlugX

Chinese PlugX Malware Hidden in Your USB Devices?A conceptual image representing malware, including PlugX
72,177
people reacted

Chinese PlugX Malware Hidden in Your USB Devices?

  • By Mike Harbison and Jen Miller-Osborn
  • January 26, 2023 at 6:00 AM

15

12 min. read

THOR: Previously Unseen PlugX Variant Deployed During Microsoft Exchange Server Attacks by PKPLUG GroupA conceptual image representing THOR, a previously unseen PlugX variant deployed by the PKPLUG Group. The image features a Panda because PKPLUG is also known as Mustang Panda. It also features the logos of Palo Alto Networks and Unit 42.
82,181
people reacted

THOR: Previously Unseen PlugX Variant Deployed During Microsoft Exchange Server Attacks by PKPLUG Group

  • By Mike Harbison and Alex Hinchliffe
  • July 27, 2021 at 12:00 PM

53

13 min. read

Trending

  • Finding Gozi: Answers to Unit 42 Wireshark Quiz, March 2023 by Brad Duncan
  • Threat Brief: 3CXDesktopApp Supply Chain Attack by Robert Falcone
  • Threat Brief - CVE-2023-23397 - Microsoft Outlook Privilege Escalation by Unit 42
45,030
people reacted

HenBox: Inside the Coop

  • By Alex Hinchliffe, Mike Harbison, Jen Miller-Osborn and Tom Lancaster
  • April 26, 2018 at 5:00 AM

18

19 min. read

58,216
people reacted

HenBox: The Chickens Come Home to Roost

  • By Alex Hinchliffe, Mike Harbison, Jen Miller-Osborn and Tom Lancaster
  • March 13, 2018 at 5:00 AM

9

18 min. read

55,760
people reacted

Paranoid PlugX

  • By Tom Lancaster and Esmid Idrizovic
  • June 27, 2017 at 5:00 AM

6

11 min. read

Tracking Elirks Variants in Japan: Similarities to Previous Attacks

  • By Kaoru Hayashi
  • June 23, 2016 at 4:00 PM

6

4 min. read

BBSRAT Attacks Targeting Russian Organizations Linked to Roaming Tiger

  • By Bryan Lee and Josh Grunzweig
  • December 22, 2015 at 5:00 PM

5

10 min. read

Bookworm Trojan: A Model of Modular Architecture

  • By Robert Falcone, Mike Scott and Juan Cortes
  • November 10, 2015 at 11:00 AM

5

10 min. read

PlugX Uses Legitimate Samsung Application for DLL Side-Loading

  • By Robert Falcone
  • May 1, 2015 at 1:29 PM

4

7 min. read

Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets

  • By Jen Miller-Osborn and Josh Grunzweig
  • April 14, 2015 at 1:31 PM

19

8 min. read

Attacks on East Asia using Google Code for Command and Control

  • By Jen Miller-Osborn
  • August 15, 2014 at 12:00 PM

4

4 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.