China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver XoBot Malware
- Dec 26, 2025
- 2 min read
Key Findings
China-linked advanced persistent threat (APT) group Evasive Panda (also known as Bronze Highland, Daggerfly, and StormBamboo) conducted a cyber espionage campaign targeting victims in Türkiye, China, and India.
The group used adversary-in-the-middle (AitM) attacks and DNS poisoning techniques to deliver its signature MgBot backdoor.
The attackers leveraged lures that masqueraded as updates for third-party software, such as SohuVA, Baidu's iQIYI Video, IObit Smart Defrag, and Tencent QQ.
Evasive Panda manipulated the IP address associated with legitimate websites like dictionary.com to fetch an encrypted second-stage shellcode.
The group employed a complex process involving XOR encryption and a custom hybrid of Microsoft's Data Protection Application Programming Interface (DPAPI) to decrypt and execute the final payload.
Background
Evasive Panda is a China-linked hacking group that has been active since at least 2012. The group has a history of leveraging DNS poisoning and AitM attacks for malware distribution, as observed in previous incidents targeting an international NGO in Mainland China and an unnamed internet service provider.
DNS Poisoning Tactics
Evasive Panda is suspected of either compromising the ISPs used by the victims or hacking a router or firewall used by the targets to poison the DNS responses.
The group manipulated the IP address associated with legitimate websites like dictionary.com, causing victim systems to resolve the website to an attacker-controlled IP address based on their geographical location and internet service provider.
Malware Delivery
The attackers used lures that masqueraded as updates for third-party software, such as SohuVA, Baidu's iQIYI Video, IObit Smart Defrag, and Tencent QQ, to deliver the malicious payload.
The initial loader is responsible for launching shellcode that fetches an encrypted second-stage shellcode in the form of a PNG image file, again by means of DNS poisoning.
Evasive Panda employed a complex process involving XOR encryption and a custom hybrid of Microsoft's DPAPI to decrypt and execute the final payload.
Targeting and Impact
The cyber espionage campaign primarily targeted victims in Türkiye, China, and India, with the group exploiting the DNS poisoning and AitM techniques to deliver its signature MgBot backdoor.
The exact nature of the second-stage payload is unclear, but it is assessed that the attackers generate a unique encrypted second shellcode file for each victim as a way to bypass detection.
Sources
https://thehackernews.com/2025/12/china-linked-evasive-panda-ran-dns.html
https://x.com/shah_sheikh/status/2004572948280045900


Comments