Skip to main content

Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite

Medium
Published: Tue Sep 30 2025 (09/30/2025, 17:21:27 UTC)
Source: AlienVault OTX General

Description

Phantom Taurus, a newly identified Chinese state-sponsored threat actor, has been conducting espionage operations targeting government and telecommunications organizations across Africa, the Middle East, and Asia. The group's primary focus includes ministries of foreign affairs, embassies, and military operations, with the objective of gathering sensitive information. Phantom Taurus employs distinctive tactics, techniques, and procedures, including a new malware suite called NET-STAR. This suite consists of three web-based backdoors designed to target Internet Information Services (IIS) web servers. The group has recently shifted from targeting emails to directly accessing databases, demonstrating their ability to adapt and evolve their methods. Phantom Taurus' activities align with Chinese strategic interests, and their infrastructure overlaps with other known Chinese APT groups.

AI-Powered Analysis

AILast updated: 09/30/2025, 19:55:36 UTC

Technical Analysis

Phantom Taurus is a newly identified Chinese state-sponsored advanced persistent threat (APT) group engaged in espionage campaigns primarily targeting government and telecommunications sectors across Africa, the Middle East, and Asia. Their main targets include ministries of foreign affairs, embassies, and military organizations, reflecting a strategic focus on gathering sensitive diplomatic and military intelligence. Phantom Taurus employs a sophisticated malware suite named NET-STAR, which consists of three distinct web-based backdoors specifically designed to compromise Microsoft Internet Information Services (IIS) web servers. This malware suite enables stealthy remote access and control over compromised servers, facilitating data exfiltration and lateral movement within victim networks. Notably, Phantom Taurus has evolved its tactics by shifting from traditional email-based phishing attacks to directly targeting backend databases, indicating enhanced capabilities for deep network infiltration and data theft. The group’s infrastructure shows overlaps with other known Chinese APT groups, suggesting shared resources or collaboration. Their tactics include a wide range of techniques such as credential dumping (T1003), remote service exploitation (T1021.001), code injection (T1055), persistence mechanisms (T1547.006), and use of known malware families like PlugX and Gh0st RAT. Indicators of compromise include multiple file hashes associated with their malware components. While no known exploits are currently reported in the wild for this campaign, the threat actor’s demonstrated adaptability and targeting of critical infrastructure make them a persistent risk. The campaign’s medium severity rating reflects the targeted nature of attacks and the potential for significant espionage impact rather than widespread destructive effects.

Potential Impact

For European organizations, the direct impact of Phantom Taurus is currently limited due to the group’s geographic targeting focus on Africa, the Middle East, and Asia. However, European entities with diplomatic, military, or telecommunications ties to these regions could be indirectly affected through supply chain or partner network compromises. European government agencies, embassies, and telecom providers operating IIS web servers may be at risk if targeted in future expansions of the campaign. The shift to database targeting increases the risk of unauthorized access to sensitive information, potentially compromising confidentiality and integrity of critical data. Successful intrusions could lead to espionage, intellectual property theft, and undermining of national security interests. Additionally, the use of stealthy web backdoors complicates detection and remediation efforts, increasing dwell time and potential damage. The medium severity rating suggests that while the threat is serious, it is currently focused and not causing widespread disruption or destruction. Nonetheless, European organizations involved in international diplomacy or telecommunications should remain vigilant given the evolving tactics and strategic motivations of Phantom Taurus.

Mitigation Recommendations

1. Harden IIS Web Servers: Apply the latest security patches and updates to IIS servers promptly. Disable unnecessary IIS modules and features to reduce the attack surface. 2. Network Segmentation: Isolate critical government and telecommunications infrastructure, especially database servers, from general network access to limit lateral movement opportunities. 3. Monitor for Indicators of Compromise: Deploy advanced endpoint and network detection tools to identify the specific file hashes and behaviors associated with NET-STAR backdoors and related malware (e.g., PlugX, Gh0st RAT). 4. Implement Strong Authentication: Enforce multi-factor authentication (MFA) for all administrative access to IIS servers and databases to prevent credential theft exploitation. 5. Conduct Regular Threat Hunting: Proactively search for signs of web shell deployments, unusual database queries, and persistence mechanisms linked to Phantom Taurus tactics. 6. Restrict Database Access: Limit database access privileges to the minimum necessary and monitor for anomalous access patterns or queries indicative of exfiltration attempts. 7. Incident Response Preparedness: Develop and test incident response plans specifically addressing web server compromises and espionage scenarios. 8. Intelligence Sharing: Collaborate with European cybersecurity agencies and international partners to share threat intelligence on Phantom Taurus activities and indicators. 9. Web Application Firewall (WAF): Deploy and properly configure WAFs to detect and block malicious web requests targeting IIS backdoors. 10. User Awareness: Train relevant personnel on spear-phishing and social engineering tactics, even though the group has shifted away from email vectors, as initial access methods may evolve.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://unit42.paloaltonetworks.com/phantom-taurus/"]
Adversary
Phantom Taurus
Pulse Id
68dc119747c51064f96051fc
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash0867745cbc4568e97d050b905a4caa0b
hash5b458c03029de4833dd1f0c10ff66633
hash9b71ae4ce0a9560840ee734e88d22db5
hash16b7f439f516cd0ff3ae6945331e1ba20a849aba
hash51a4728ddfc67b8ec12d24475a4e50a5ed60dd84
hashfb3b2ce44dcecef37ef23fbfe3860e5674229f76
hash3e55bf8ecaeec65871e6fca4cb2d4ff2586f83a20c12977858348492d2d0dec4
hashafcb6289a4ef48bf23bab16c0266f765fab8353d5e1b673bd6e39b315f83676e
hashb76e243cf1886bd0e2357cbc7e1d2812c2c0ecc5068e61d681e0d5cff5b8e038
hasheeed5530fa1cdeb69398dc058aaa01160eab15d4dcdcd6cb841240987db284dc

Threat ID: 68dc359a4fa123577f2a8430

Added to database: 9/30/2025, 7:55:06 PM

Last enriched: 9/30/2025, 7:55:36 PM

Last updated: 10/1/2025, 3:16:26 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats