Working with U.S. Government partners, FBI, and DoD identified a malware variant used by Chinese government cyber actors, which is known as TAIDOOR.
FBI has high confidence that Chinese government actors are using malware variants in conjunction with proxy servers to maintain a presence on victim networks and to further network exploitation. CISA, FBI, and DoD are distributing this information to enable network defense and reduce exposure to Chinese government malicious cyber activity.
While traditional signature and heuristic based endpoint protection require an update to detect and respond to this type of zero-day malware, our 24×7 threat hunting team catch C2 remote access trojans by state-of-the-art inspection of your system logs through multiple Security Information Event Management systems (SIEMs).
Find out more about what makes our security different:
This MAR includes suggested response actions and recommended mitigation techniques. Users or administrators should flag activity associated with the malware and report the activity to the Cybersecurity and Infrastructure Security Agency (CISA) or the FBI Cyber Watch (CyWatch), and give the activity the highest priority for enhanced mitigation.
Malicious binaries identified as a x86 and x64 version of Taidoor were submitted for analysis. Taidoor is installed on a target’s system as a service dynamic link library (DLL) and is comprised of two files. The first file is a loader, which is started as a service. The loader decrypts the second file, and executes it in memory, which is the main Remote Access Trojan (RAT).
cnaweb.mrsl####.com (Domain obfuscated for link protection)