Overview
- Researchers say an adversary-in-the-middle captive-portal redirect sent targets to a fake Adobe plugin site that delivered a signed downloader named AdobePlugins.exe.
- The downloader, tracked as STATICPLUGIN and signed with a GlobalSign certificate issued to Chengdu Nuoxin, side-loaded CANONSTAGER to run the SOGU.SEC PlugX backdoor in memory.
- About two dozen victims downloaded the malware, with most believed to be diplomats in Southeast Asia, though the full scope of data loss remains unclear.
- GTIG attributes the operation to UNC6384 with overlaps to clusters commonly tracked as Mustang Panda, TEMP.Hex, and Silk Typhoon.
- Google blocked associated domains and hashes via Safe Browsing, notified affected Gmail and Workspace users, shared IoCs and YARA rules, and advised treating Chengdu Nuoxin–signed binaries as untrusted as the initial edge-device compromise vector is still under investigation.