Tech Trends
Palo Alto Networks’ Unit 42 Uncovers Previously Undocumented Chinese Threat Group “Phantom Taurus”

Palo Alto Networks’ Unit 42 Uncovers Previously Undocumented Chinese Threat Group “Phantom Taurus”

Palo Alto Networks’ threat intelligence and incident response team, Unit 42, has uncovered a previously undocumented Chinese threat group, now touted as “Phantom Taurus.” Active for more than two years, the group has conducted targeted operations against ministries of foreign affairs, embassies, telecommunications providers, and other government-linked entities across Asia, the Middle East, and Africa.

 

Unit 42’s research indicates that Phantom Taurus is a China-nexus threat actor focused on long-term intelligence collection, rather than short-term disruption or financial gain. The group’s operations appear to align with broader geopolitical objectives, emphasizing data theft from high-value government systems and critical communications networks.

 

“Unit 42’s discovery of the Phantom Taurus threat group is a reminder of why ongoing investigation and open sharing of intelligence matter so much. When we understand how these actors operate, we can strengthen defenses before they strike; not scramble after the fact,” said Swapna Bapat, Vice President & Managing Director, India and SAARC, Palo Alto Networks. “Bringing threats like this into the open, takes away their greatest advantage — invisibility — helping us strengthen our collective defense in the process.”

 

A New Generation of Stealth and Precision

Unlike typical cyber-espionage groups that rely on widespread phishing or malware campaigns, Phantom Taurus operates with surgical precision. Recent activity shows a clear evolution: rather than broadly stealing email data, the group directly queries internal databases to extract only the most relevant intelligence — such as diplomatic communications or regional policy records.

 

To enable this, Phantom Taurus deploys a custom-built toolkit called NET-STAR, which targets Microsoft Internet Information Services (IIS) web servers — software commonly used by government portals and enterprise websites. The toolkit features fileless backdoors that live entirely in system memory, allowing attackers to blend in with legitimate network traffic and evade most detection tools.

 

In some cases, the attackers went a step further — remotely running a custom script on government database servers to search for documents and records referencing countries such as Afghanistan and Pakistan. Using a legitimate Windows administration tool to execute these searches, they demonstrated both technical sophistication and a clear intelligence focus on regional affairs. (See figure below.)

 

 

Leave A Comment