Is RedDelta Behind the Latest Cyber Espionage Campaigns in Asia?

Over the years, the landscape of cyber espionage has dramatically evolved, with sophisticated actors like RedDelta continually advancing their methods to exploit vulnerabilities for strategic gains. Known also as Mustang Panda, RedDelta has firmly established itself as one of the most prominent state-sponsored Chinese threat actors. Recent analyses by Recorded Future’s Insikt Group have revealed that between July 2023 and December 2024, RedDelta launched a series of cyber espionage campaigns targeting a range of countries, including Mongolia and Taiwan. These campaigns utilized customized PlugX malware to infiltrate critical networks, driven by motives rooted in political and defense-related themes, such as the 2024 Taiwanese presidential candidacy and the Vietnamese National Holiday. The discovery of these activities underscores the persistent and evolving nature of cyber threats as state actors continue to refine their tactics in pursuit of geopolitical objectives.

RedDelta’s Targets and Motivations

RedDelta’s operations between July 2023 and December 2024 showcased a strategic focus on politically significant events and defense-related themes within the targeted nations. During this period, the group targeted multiple countries, including Mongolia and Taiwan. Key motivations for these campaigns included monitoring the 2024 Taiwanese presidential candidacy, the Vietnamese National Holiday, flood protection efforts in Mongolia, and ASEAN meetings. Particularly notable was the breach of the Mongolian Ministry of Defense in August 2024, highlighting the group’s capability to compromise high-value defense targets. Similarly, the Communist Party of Vietnam was targeted in November 2024, further exemplifying RedDelta’s focus on politically sensitive entities. Beyond these regions, the group extended its reach to victims in Malaysia, Japan, the United States, Ethiopia, Brazil, Australia, and India in late 2024.

RedDelta has been active since 2012 and is known for continuously refining its tactics to stay ahead of cybersecurity defenses. One of the group’s recent innovations involves the use of Visual Studio Code tunnels as a means to facilitate espionage operations targeting government entities in Southeast Asia. By leveraging these tunnels, RedDelta has been able to execute operations with a higher degree of stealth and effectiveness. Recorded Future’s Insikt Group observed these evolving strategies, noting their use of Windows Shortcut, Windows Installer, and Microsoft Management Console files in spear-phishing campaigns. These campaigns aim to deploy PlugX malware via DLL side-loading techniques, offering the attackers persistent and covert access to compromised networks.

Techniques and Tools Employed by RedDelta

RedDelta’s ability to adapt its techniques to evade detection has been a hallmark of its operations. In 2023, the group demonstrated this capacity by altering its phishing methods. Some of their campaigns involved sending phishing emails with links to HTML files hosted on Microsoft Azure. These emails initiated the MSC payload, which subsequently dropped an MSI installer that loaded PlugX via DLL search order hijacking. This evolution in tactics highlights the group’s commitment to leveraging advanced techniques to enhance the success rate of their campaigns. Additionally, RedDelta’s use of the Cloudflare CDN to mask their command-and-control (C2) traffic signifies their sophisticated approach to blending malicious traffic with legitimate CDN traffic, complicating efforts to detect and mitigate their operations.

Recorded Future’s analysts identified ten administrative servers communicating with RedDelta’s C2 servers, all of which were registered to China Unicom Henan Province. The group’s targeting strategy aligns closely with Chinese strategic priorities, emphasizing entities such as governments and diplomatic organizations across Southeast Asia, Mongolia, and Europe. This alignment suggests that RedDelta’s activities are not isolated incidents but rather components of a broader strategic objective aimed at bolstering China’s geopolitical influence.

Broader Implications and Connections

RedDelta is known for its adaptability in evading detection, and in 2023, the group showcased its ability to alter its phishing techniques. They sent emails containing links to HTML files hosted on Microsoft Azure. These emails then triggered the MSC payload, which dropped an MSI installer that activated PlugX through DLL search order hijacking. This change in tactics underscores their commitment to using advanced methods to improve their campaign success. Furthermore, RedDelta’s use of Cloudflare’s CDN to disguise their command-and-control (C2) traffic demonstrates a sophisticated approach by blending malicious traffic with legitimate CDN traffic, making detection and mitigation more challenging.

Analysts at Recorded Future identified ten administrative servers interacting with RedDelta’s C2 servers, all registered to China Unicom in Henan Province. RedDelta’s targets align closely with China’s strategic interests, focusing on governments, diplomatic bodies, and other entities in Southeast Asia, Mongolia, and Europe. This alignment suggests that RedDelta’s activities are part of a broader strategic plan to enhance China’s geopolitical influence, rather than isolated incidents.

Explore more