US authorities just purged malware from thousands of devices across the world
After taking control of the PlugX malware’s command-and-control server, the coalition were able to trigger a self-delete mechanism to remove the malicious program
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
The US Justice Department and FBI have revealed a joint operation with international partners was able to delete malware injected by Chinese threat actors to thousands of devices around the world.
Announced on 14 January, the months-long operation was conducted in collaboration with French law enforcement in which the PlugX malware was removed from more than 4,200 computers worldwide.
According to court documents, the group behind the attack, referred to alternatively as Twill Typhoon or Mustang Panda, has been active from around 2014 and was paid by the PRC to develop a specific version of the PlugX malware for the intrusion campaign.
In the affidavit, the FBI stated that the malware was used by the attackers to exfiltrate files and other information held on the computers of government agencies and private enterprises in the US, ostensibly for espionage purposes.
Foreign entities were also targeted, the FBI noted, with notable targets including European shipping companies in 2024 and a number of European governments between 2021 and 2023.
The joint operation was able to remove the malware from the target devices in this instance after a French law enforcement agency gained access to a command-and-control (C2) server that could send commands to infected devices.
French law enforcement identified the malware’s infrastructure included a native ‘self-delete’ functionality which they were able to leverage once they had control of the C2 server.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Once triggered, the mechanism deleted all the files created by the PlugX malware on the target device and all PlugX registry keys used to automatically run the PlugX malware when the system is booted, as well as removing the PlugX application once it is stopped running.
What is PlugX?
The PlugX malware family has been observed in attacks from as early as 2008. It has been leveraged by multiple threat actors but researchers have typically associated its use with espionage-focused groups linked to China, including Mustang Panda.
Chris Jones, incident response analyst at Check Point Software, described PlugX as a modular malware with a variety of capabilities, all suited for espionage objectives.
“PlugX is a powerful remote access Trojan (RAT) often used in targeted cyber-espionage campaigns. Its modular design allows attackers to tailor its capabilities to their specific needs, enabling activities like data theft, keylogging, file manipulation, and executing commands on infected systems,” he explained.
“It is typically spread through spear-phishing campaigns, exploiting vulnerabilities, or using malicious attachments to gain access.”
RELATED WHITEPAPER
He added that efforts to neutralize the threat posed from malicious tools like PlugX usually revolve around targeting the infrastructure the malware relies on for execution, much like this most recent operation carried out by US and French law enforcement.
"Law enforcement agencies seizing servers used to facilitate PlugX operations are adding to efforts like the 2019 seizure of servers linked to the Imminent Monitor RAT. These coordinated actions demonstrate an ongoing commitment to dismantling cybercriminal infrastructure and protecting users from sophisticated malware and privacy threats."
Matthew G. Olsen, assistant attorney general of the Justice Department’s National Security Division, said such operations rely on security agencies working together, praising the efforts of the French government in this instance.
“This operation, like other recent technical operations against Chinese and Russian hacking groups like Volt Typhoon, Flax Typhoon, and APT28, has depended on strong partnerships to successfully counter malicious cyber activity. I commend partners in the French government and private sector for spearheading this international operation to defend global cybersecurity.”

Solomon Klappholz is a former staff writer for ITPro and ChannelPro. He has experience writing about the technologies that facilitate industrial manufacturing, which led to him developing a particular interest in cybersecurity, IT regulation, industrial infrastructure applications, and machine learning.
-
CirrusHQ names Matt Smith as new sales chiefNews The sales leadership veteran will work to strengthen the AWS cloud specialist’s customer relationships as demand grows for cloud resilience
-
Cloud maturity is hampering AI adoptionNews Investment in cloud isn’t keeping pace with AI demand, new research shows
-
'It's destructive, not ransomware': Security experts weigh in on motivation behind Stryker cyber attackNews The attack on medical tech company Stryker has severely impacted operations globally
-
Thousands of Asus routers are being used to fuel a massive cyber crime spreeNews Black Lotus Labs has spotted a massive botnet of Asus routers built by malware that uses a common peer networking tool
-
The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in lifeNews With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion
-
DIY hackers are turning to ‘flat-pack’ malware components to speed up attacks and cut costsNews While these malware campaigns are very basic, researchers noted “they still work”
-
‘They are able to move fast now’: AI is expanding attack surfaces – and hackers are looking to reap the same rewards as enterprises with the technologyNews Potent new malware strains, faster attack times, and the rise of shadow AI are causing havoc
-
Chinese hackers are using ‘stealthy and resilient’ Brickstorm malware to target VMware servers and hide in networks for months at a timeNews Organizations, particularly in the critical infrastructure, government services, and facilities and IT sectors, need to be wary of Brickstorm
-
The Scattered Lapsus$ Hunters group is targeting Zendesk customers – here’s what you need to knowNews The group appears to be infecting support and help-desk personnel with remote access trojans and other forms of malware
-
Shai-Hulud malware is back with a vengeance and has hit more than 19,000 GitHub repositories so far — here's what developers need to knowNews The malware has compromised more than 700 widely-used npm packages, and is spreading fast