Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Is ‘Baby Grok’ the Future of Kids’ AI? Elon Musk Launches New Chatbot

Iran-linked DCHSPY Android malware is equipped with a VPN app that spies against the rebels

China-linked hackers launch targeted spy campaigns on Africa’s IT infrastructure

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New TCESB malware found in active attacks using ESET security scanners
Identity

New TCESB malware found in active attacks using ESET security scanners

userBy userApril 9, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 9, 2025Ravi LakshmananWindows Security/Vulnerabilities

TCESB Malware

Related China’s threat actors known for cyberattacks in Asia have been observed to exploit security flaws from ESET to provide previously undocumented malware codenames TCESB.

“We weren’t able to see it before due to ToddyCat’s attacks. [TCESB] Kaspersky said in an analysis published this week.

ToddyCat is the name given to a threat activity cluster targeting several entities in Asia, and the attack dates back at least until December 2020.

Last year, Russian cybersecurity vendors detailed the use of hacking groups for various tools to maintain permanent access to “industrial scale” breached environments and harvest data from organizations in the Asia-Pacific region.

Cybersecurity

Kaspersky said an investigation into a ToddyCat-related incident in early 2024 excavated suspicious DLL files (“version.dll”) in the TEMP directories of multiple devices. It turns out that TCESB, a 64-bit DLL, is invoked via a technique called DLL Search Order Hijacking to seize control of the execution flow.

This is said to have been achieved by taking advantage of the flaws in the ESET command line scanner. This blames a DLL named “version.dll” by first checking the files in the current directory and then checking them in the system directory.

At this stage it is worth pointing out that “version.dll” is a legitimate version check and file installation library for Microsoft located in the “C:\Windows\System32\” or “C:\Windows\Syswow64\” directory.

This loophole is exploiting the loophole, which means that an attacker can run a malicious version of “version.dll” in contrast to a legitimate response. The vulnerability tracked as CVE-2024-11859 (CVSS score: 6.8) was fixed by ESET in late January 2025 following responsible disclosure.

TCESB Malware

“The vulnerability allows an attacker with administrator privileges to load a malicious dynamic link library and execute code,” ESET said in an advisory released last week. “However, this technique did not increase privileges. Attackers would need to have administrator privileges to carry out this attack.”

In a statement shared with Hacker News, Slovak Cybersecurity Company said it will address the vulnerability by releasing fixed builds of consumer, business and server security products for the Windows operating system.

TCESB is, in its part, a modified version of an open source tool called Edrsandblast, which contains the ability to change the kernel structure of the operating system, disables notification routines (also known as callbacks). It is designed to notify the driver of specific events, such as creating processes and setting registry keys.

Cybersecurity

To pull this off, TCESB utilizes another known technique called bringing its own vulnerable driver (BYOVD) to install the vulnerable driver, Dell dbutildrv2.sys driver, within the system via the device manager interface. The DBUTILDRV2.SYS driver is susceptible to the defects in known privilege escalation tracked as CVE-2021-36276.

This is not the first Dell driver to be abused for malicious purposes. In 2022, a similar privilege escalation vulnerability (CVE-2021-21551) in another Dell driver, DBUTIL_2_3.SYS, was also exploited as part of a BYOVD attack by the North Korean-linked Lazarus group, turning off the security mechanism.

“When a vulnerable driver is installed on your system, TCESB runs a loop and checks every 2 seconds for the existence of payload files with a specific name in the current directory. There may be no payloads when the tool starts up.”

The payload artifact itself is not available, but further analysis determined that it was encrypted using AES-128 and decoded and executed as soon as it appears in the specified path.

“To detect activity for such tools, we recommend monitoring systems for installation events involving drivers with known vulnerabilities,” Kaspersky said. “It is also worth watching for events related to loading Windows kernel debug symbols on devices where debugging of the operating system kernel is not expected.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleRebrand is seeing a surge in demand at the Great Yorkshire Event Centre
Next Article Google Workspace gets a summary of automation flow, podcast styles
user
  • Website

Related Posts

Iran-linked DCHSPY Android malware is equipped with a VPN app that spies against the rebels

July 21, 2025

China-linked hackers launch targeted spy campaigns on Africa’s IT infrastructure

July 21, 2025

SharePoint 0-Day, Chrome Exploit, macOS Spyware, NVIDIA Toolkit RCE and More

July 21, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Is ‘Baby Grok’ the Future of Kids’ AI? Elon Musk Launches New Chatbot

Iran-linked DCHSPY Android malware is equipped with a VPN app that spies against the rebels

China-linked hackers launch targeted spy campaigns on Africa’s IT infrastructure

Anduril alumni raises a $24 million Series A to extract military logistics from the Excel spreadsheet era

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Is ‘Baby Grok’ the Future of Kids’ AI? Elon Musk Launches New Chatbot

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.