This is a news story, published by Gizmodo, that relates primarily to Ć¢Mustang PandaĆ¢ news.
For more Ć¢Mustang PandaĆ¢ news, you can click here:
more Ć¢Mustang PandaĆ¢ newsFor more Us crime, violence, terrorism & cybercrime news, you can click here:
more Us crime, violence, terrorism & cybercrime newsFor more news from Gizmodo, you can click here:
more news from GizmodoOtherweb, Inc is a public benefit corporation, dedicated to improving the quality of news people consume. We are non-partisan, junk-free, and ad-free. We use artificial intelligence (AI) to remove junk from your news feed, and allow you to select the best politics news, business news, entertainment news, and much more. If you like this article about Us crime, violence, terrorism & cybercrime, you might also like this article about
notorious Chinese hacking group. We are dedicated to bringing you the highest-quality news, junk-free and ad-free, about your favorite topics. Please come every day to read the latest malicious software news, malware news, news about Us crime, violence, terrorism & cybercrime, and other high-quality news about any topic that interests you. We are working hard to create the best news aggregator on the web, and to put you in control of your news feed - whether you choose to read the latest news through our website, our news app, or our daily newsletter - all free!
Remote Access TrojanGizmodo
ā¢56% Informative
PlugX is a Remote Access Trojan that has been around since at least 2008 .
It has been a favorite tool of a notorious Chinese hacking group that is often referred to as Ć¢Mustang PandaĆ¢ or Ć¢Twill Typhoon .
The FBI used the know-how of French intelligence agencies to get PlugX to self-destruct.
The malware has been used to target European shipping companies and government agencies.
VR Score
39
Informative language
31
Neutral language
42
Article tone
semi-formal
Language
English
Language complexity
52
Offensive language
likely offensive
Hate speech
not hateful
Attention-grabbing headline
detected
Known propaganda techniques
not detected
Time-value
short-lived
External references
6
Source diversity
5
Affiliate links
no affiliate links