Overview
- Unit 42 reclassified a long-running intrusion cluster as Phantom Taurus and detailed a bespoke .NET malware suite called NET-STAR.
- The group has focused on foreign ministries, embassies, diplomats, telecoms, and military-related systems in Africa, the Middle East, and Asia.
- Intrusions often began by exploiting unpatched Exchange and IIS servers, including ProxyLogon and ProxyShell vulnerabilities, to reach sensitive communications.
- Operations evolved from email harvesting to direct SQL Server data theft via WMI-executed batch scripts that export results and target country-specific material such as Afghanistan and Pakistan.
- Investigators report almost 10 victims to date, continued activity in recent months, and infrastructure overlaps with AT27/Iron Taurus, APT41/Winnti, and Mustang Panda alongside unique tooling like IIServerCore and AssemblyExecuter with AMSI/ETW bypass and timestomping.