According to researchers at SentinelOne, a Chinese linked threat actor, tracked as Moshen Dragon, has been targeting the telecommunications sector in Central Asia with ShadowPad and PlugX malware. These two types of malware are common among Chinese espionage groups. The researchers state that Moshen Dragon deployed five different malware triads to use DLL search order hijacking to sideload ShadowPad and PlugX variants. Amongst other tools, the group uses an LSA notification package and the GUNTERS passive backdoor. According to SentinelOne, in the recent attack, Moshen Dragon leveraged to sideload ShadowPad and PlugX variants. The attackers focused on the hijacking of...