Protos AI Agent, under the supervision of Demas
Phantom Taurus is a Chinese APT group whose operations align with the interests of the People’s Republic of China. The group is characterized by its focus on high-value espionage targets, including ministries of foreign affairs, embassies, military, and telecom organizations in Africa, the Middle East, and Asia. The group’s motivation centers on intelligence collection around major geopolitical events and maintaining persistent access to sensitive networks. Phantom Taurus stands out for its custom malware, rare TTPs, and infrastructure overlap with other Chinese APTs, but maintains a unique operational playbook.
Phantom Taurus maintains robust, compartmentalized infrastructure, primarily leveraging Chinese cloud services. The group uses Huawei Public Cloud Service in Shanghai, China, with the primary IP node 123.60.148.239
hosting key assets and associated with the domain netstar.cn
. Web services run OpenResty on ports 80 (HTTP), 443 (HTTPS), and 6443, with a valid TLS certificate for mp.netstar.cn
(TrustAsia DV TLS RSA CA 2025, expires 2025-12-24). Associated domains include netstar.cn
, phantomtaurus.cn
, and several subdomains. The infrastructure is designed for operational security, supporting persistent, stealthy operations and sharing resources with other Chinese APTs such as APT27, Winnti, and Mustang Panda.
Phantom Taurus employs a sophisticated, custom-built malware suite and supporting tools:
eeed5530fa1cdeb69398dc058aaa01160eab15d4dcdcd6cb841240987db284dc
.The NET-STAR suite and its components are the technical backbone of Phantom Taurus campaigns, enabling persistent, stealthy access to targeted infrastructure and demonstrating advanced evasion techniques such as AMSI and ETW bypass, encryption, and timestomping.
Phantom Taurus’s operations map to the following MITRE ATT&CK tactics and techniques:
Phantom Taurus prefers exploiting internet-facing vulnerabilities and deploying fileless, in-memory malware for stealth. The group’s operational playbook is distinguished by its precision and persistence, with a focus on high-value targets and advanced evasion methods.
eeed5530fa1cdeb69398dc058aaa01160eab15d4dcdcd6cb841240987db284dc
(IIServerCore)netstar.cn
, phantomtaurus.cn
, plus subdomains123.60.148.239
mp.netstar.cn
(expires 2025-12-24)These indicators should be integrated into detection and response workflows for organizations at risk.
Phantom Taurus shares infrastructure and operational overlap with other Chinese APTs (APT27, Winnti, Mustang Panda), but maintains a distinct malware suite and TTPs. The NET-STAR suite and associated backdoors are not observed in other known Chinese APT campaigns. The group’s activity is timed to coincide with major geopolitical events, indicating strategic intelligence objectives.
Phantom Taurus represents a significant evolution in Chinese APT tradecraft, combining advanced malware, stealthy operational techniques, and cloud-based infrastructure to conduct persistent espionage against high-value targets. The group’s activities are well-documented through technical indicators, infrastructure mapping, and contextual intelligence, enabling effective detection and response. Organizations in government and telecom sectors across Africa, the Middle East, and Asia should prioritize monitoring for the identified IOCs and TTPs.
All findings are grounded in direct evidence from authoritative threat intelligence sources and technical analysis.