A government organization in Southeast Asia has been hit by a large-scale cyber espionage campaign that Palo Alto Networks’ Unit 42 describes as “sophisticated and well-resourced.” The investigation points to three coordinated activity clusters with links to China-nexus threat actors, working in parallel to achieve long-term access to sensitive government systems.
Three Coordinated Threat Clusters Linked to China
Unit 42 researchers identified three distinct but related clusters: Mustang Panda, CL-STA-1048, and CL-STA-1049. While each cluster leverages different tooling and tradecraft, they share overlapping TTPs (tactics, techniques and procedures) that are consistent with operations previously attributed to China-aligned cyber espionage groups in public reports by major cybersecurity vendors.
According to the analysis, the objective was not a one-off intrusion but the establishment of durable, covert access to internal government infrastructure. This persistence-focused strategy is typical of espionage-motivated campaigns, where attackers quietly remain inside networks for months or years to exfiltrate documents, map internal systems, and stage further operations.
Malware Families Used in the Cyber Espionage Campaign
The campaign employed a wide ecosystem of malware families, including HIUPAN (also known as USBFect, MISTCLOAK or U2DiskWatch), PUBLOAD, EggStremeFuel (RawCookie), EggStremeLoader (Gorem RAT), MASOL RAT, PoshRAT, TrackBak Stealer, RawCookie, Hypnosis Loader, and FluffyGh0st RAT. This breadth of tooling suggests access to a mature development pipeline and substantial operational resources.
Particularly notable are USB-centric malware components and loaders masquerading as legitimate libraries. Such tools are designed to operate effectively even in air‑gapped or tightly segmented environments, where internet connectivity is restricted but removable media remain in use for data transfer.
Mustang Panda: USB-Borne Infection Chain and Claimloader Infrastructure
Activity linked to the well-known China-nexus group Mustang Panda was observed between 1 June and 15 August 2025. At the core of this cluster was HIUPAN, a malware family optimized for propagation via USB drives. Once introduced into a system, HIUPAN relied on a fake library dubbed Claimloader to initiate the next stage.
Unit 42 notes that Claimloader has been in Mustang Panda’s arsenal since at least late 2022, including in campaigns against Philippine government entities documented by multiple security vendors. In the current operation, Claimloader was used to deploy and maintain the PUBLOAD backdoor and to install an additional long-standing Mustang Panda tool, COOLCLIENT.
COOLCLIENT offers a comprehensive set of espionage capabilities: file upload and download, keylogging, traffic tunneling, and collection of network configuration data. This functionality enables attackers both to exfiltrate sensitive information and to convert compromised hosts into pivot points for deeper lateral movement across government networks.
CL-STA-1048 and CL-STA-1049: Noisy Tooling, Hypnosis Loader and FluffyGh0st RAT
The CL-STA-1048 cluster is characterized by what researchers describe as a “noisy” toolkit: a large mix of scripts, binaries, and utilities that complicate precise attribution of individual samples. This deliberate noise can serve as operational camouflage, making it harder for defenders to reconstruct the attack chain or confidently link it to a specific group.
The CL-STA-1049 cluster relied on a new DLL loader called Hypnosis Loader. It uses DLL side‑loading, a technique in which a malicious DLL replaces or sits alongside a legitimate one and is loaded by a trusted application. This abuse of trust and digital signatures is a common method used by advanced persistent threats (APTs) to bypass traditional antivirus and application whitelisting.
The ultimate objective of Hypnosis Loader is to deploy FluffyGh0st RAT, a remote access trojan that grants attackers sustained control over infected machines. Once established, FluffyGh0st can execute commands, exfiltrate files, and maintain persistence, providing a robust foothold for continued espionage activities.
Unit 42 has not yet conclusively determined the initial access vectors for CL-STA-1048 and CL-STA-1049. However, the combination of DLL side-loading, multi-stage loaders, and full-featured RATs aligns with broader patterns observed in stealthy, long-term intrusions into hardened government and critical infrastructure networks.
Implications for Government and Critical Infrastructure Cybersecurity
Based on the shared target set, overlapping tooling, and common focus on persistence, Unit 42 assesses that the three clusters likely formed part of a single, strategically aligned operation. The use of Chinese-linked TTPs, the emphasis on intelligence collection over disruption, and the targeting of a Southeast Asian government are all consistent with behaviors attributed to China-nexus espionage actors in public threat intelligence reporting.
The incident highlights several important trends for defenders in the public sector and critical infrastructure:
1. Resurgence of USB-based attacks in restricted environments. Removable media remain a weak point in networks with limited internet exposure. Recent industry case studies repeatedly show that USB-borne malware is a favored technique for penetrating air‑gapped or highly segmented environments.
2. Growing reliance on DLL side-loading to evade detection. By piggybacking on trusted, signed applications, attackers bypass controls that focus primarily on file reputation and signatures. Proactive monitoring of unusual DLL load paths and parent-child process relationships is becoming essential.
3. Clear prioritization of espionage over destructive activity. The tooling set, from PUBLOAD and COOLCLIENT to FluffyGh0st RAT, is optimized for stealth, data theft, and command-and-control rather than encryption or sabotage, aligning with long-term intelligence-gathering objectives.
For government agencies and operators of critical infrastructure, this campaign underscores the need to update threat models and security priorities. Effective countermeasures include strict USB device governance (whitelisting, mandatory encryption, automatic scanning), deployment of EDR/XDR platforms with behavioral analytics, and targeted threat hunting focused on DLL side-loading patterns and anomalous RAT activity. Regular security audits, red-team exercises, and realistic incident simulations help organizations understand their true exposure, shorten detection times, and make it significantly harder for advanced adversaries to maintain hidden, long-term access to strategic networks.