Mofang is a likely China-based cyber espionage group, named for its frequent practice of imitating a victim's infrastructure. This adversary has been observed since at least May 2012 conducting focused attacks against government and critical infrastructure in Myanmar, as well as several other countries and sectors including military, automobile, and weapons industries.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1027 | .013 | Obfuscated Files or Information: Encrypted/Encoded File |
Mofang has compressed the ShimRat executable within malicious email attachments. Mofang has also encrypted payloads before they are downloaded to victims.[1] |
Enterprise | T1566 | .001 | Phishing: Spearphishing Attachment |
Mofang delivered spearphishing emails with malicious documents, PDFs, or Excel files attached.[1] |
.002 | Phishing: Spearphishing Link |
Mofang delivered spearphishing emails with malicious links included.[1] |
||
Enterprise | T1204 | .001 | User Execution: Malicious Link |
Mofang's spearphishing emails required a user to click the link to connect to a compromised website.[1] |
.002 | User Execution: Malicious File |
Mofang's malicious spearphishing attachments required a user to open the file after receiving.[1] |