Threat Landscape Dashboard

Assessing today's threats and the relationships between them

Operation Vicious Panda

The Mongolian public sector was targeted with RTF attachments disguised as documents sent from the Mongolian Ministry of Foreign Affairs. The threat actor behind the attack used the COVID-19 pandemic as a lure and infected victims with a remote access trojan capable of exfiltrating, creating, moving, and deleting files and folders. The Royal Road RTF Weaponizer tool was used to create the malicious documents which contained embedded objects that exploited the Equation Editor flaws in Microsoft Word. Persistence, defense evasion, and execution was achieved using rundll32.exe, the Windows startup folder, and obfuscation.
Name Modified Date Sources
Operation Vicious Panda 2020-03-18