Mofang
Mofang is a likely Chinese-based cyber espionage group, named for its frequent practice of imitating a victim's infrastructure. This group has been active since at least May 2012, and has conducted focused attacks against the government and critical infrastructure in Myanmar, and several other countries and industries, including military, automobile, and weapons.
Other names for this threat
Superman
This is a collection of rules based on the presence of indicators of compromise publicly reported as associated with this malicious actor.
- Suspicious DNS Request - Mofang Related Domain Observed
- Suspicious Process - Mofang Related Binary Executed
- Suspicious Web Request - Mofang Related Domain Observed
Suspicious DNS Request - Mofang Related Domain Observed
This detection identifies a request to resolve a domain publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often use compromised legitimate websites for malicious purposes.
Recommendation
The alert may be related to normal web browsing activity by the end user. Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.
Suspicious Process - Mofang Related Binary Executed
This detection identifies the execution of a file with a hash publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often use common System Administration tools for malicious purposes.
Recommendation
Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.
Suspicious Web Request - Mofang Related Domain Observed
This detection identifies a request to a domain publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often compromise legitimate websites to use for malicious purposes.
Recommendation
The alert may be related to normal web browsing activity by the end user. Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.