Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Police say two students turned themselves back after a fatal stab wound outside a California high school

The documentary sheds light on Biden’s reaction to the murder of Shireen Abuakure | News in the Occupy West Bank

Health Technology Startup Kouper emerges from $10 million stealth in funding to transform the patient care transition

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Mirrorface targets Japan and Taiwan with RoamingMouse and upgraded Anel malware
Identity

Mirrorface targets Japan and Taiwan with RoamingMouse and upgraded Anel malware

userBy userMay 8, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 8, 2025Ravi LakshmananMalware/Cyberspy

RoamingMouse and upgraded Anel malware

It has been observed that Nation-State threat actors, known as Mirrorface, are deploying malware called RoamingMouse as part of cyberspy activities directed to government and public agencies in Japan and Taiwan.

Activities detected in Trend Micro in March 2025 included the use of a spearfishing racker to provide an updated version of the backdoor called Anel.

“The ANEL file for the 2025 campaign discussed in this blog has implemented a new command to support the execution of BOFs (beacon object files) in memory,” says security researcher Hara Hiroaki. “This campaign could also utilize Sharpd to launch a second-phase backdoor Noopdoor.”

The China-lined threat actors, also known as Earthkasha, are rated as subclusters within APT10. In March 2025, ESET shed light on a campaign called Operation Akairyū in August 2024 targeting Anel (aka Uppercut) and diplomatic organisations in the European Union.

Cybersecurity

Targeting various entities in Japan and Taiwan points to a continuous expansion of footprints as hacking crews seek to carry out information theft to advance their strategic goals.

The attack begins with a spear phishing email – some of it is sent from a legal but compromised account – contains an embedded Microsoft OneDrive URL, which downloads a ZIP file.

The ZIP archive contains malware-covered Excel documents and RoamingMouse, a macro-enabled dropper codename that acts as a conduit to deliver components related to ANEL. It is worth noting that Roaming Mouse has been used by Mirrorface since last year.

“RoamingMouse uses Base64 to decode embedded ZIP files, drop zips on disk, and extend the components,” says Hiroaki. This is –

jslntool.exe, jstiie.exe, or jsvwmng.exe (legal binary) JSFC.dll (aneldr) Encrypted ANEL payload MSVCR100.dll (legal DLL dependencies for executables)

The ultimate goal of the attack chain is to launch a legitimate executable using Explorer.exe and use it to remove malicious DLLs, in this case Aneldr.

What’s noteworthy about the ANEL artifact used in the 2025 campaign is that it adds new commands with new commands to support in-memory execution of Beacon Object Files (BOFS). It compiles a C program designed to extend the Cobalt Strike Agent with new post-explosion functionality.

“After installing the ANEL file, the actor behind Earth Kasha used backdoor commands to take screenshots and examine the victim’s environment,” explained Trend Micro. “The enemy appears to be looking at screenshots, running a process list, examining domain information to investigate victims.”

Cybersecurity

It also leverages an open source tool named Sharphide to use the selected instance to launch another new backdoor version of Noopdoor (aka Hiddenface), which was previously identified as used by Hacking Group. The implant supports DNS-over-HTTPS (DOH) for that part, hiding IP address searches during command and control (C2) operations.

“Earthkasha continues to be an aggressive, highly sustained threat, and is currently targeting government and public institutions and public institutions at Taiwan and Japan in its latest campaign detected in March 2025,” Hiroaki said.

“Companies and organizations, particularly those with high value assets such as governance-related sensitive data, intellectual property, infrastructure data, and access credentials, should remain vigilant and implement proactive security measures to prevent victims of cyberattacks.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHAC welcomes the London Competition for the 9th consecutive year
Next Article Why Hims & Hers turn to the autonomous vehicle industry and find AI-savvy CTOs
user
  • Website

Related Posts

Over 38,000 Freedrain subdomains have been discovered after exploiting SEO to steal crypto wallet seed phrases

May 8, 2025

SONICWALL Patch 3 flaws in SMA 100 devices allow attackers to execute code as root

May 8, 2025

Qilin ransomware ranked best in April 2025 with over 45 data leak disclosures

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Police say two students turned themselves back after a fatal stab wound outside a California high school

The documentary sheds light on Biden’s reaction to the murder of Shireen Abuakure | News in the Occupy West Bank

Health Technology Startup Kouper emerges from $10 million stealth in funding to transform the patient care transition

Trump’s anti-DEI push won’t stop black Kentucky alumni from holding off-campus celebrations

Trending Posts

The documentary sheds light on Biden’s reaction to the murder of Shireen Abuakure | News in the Occupy West Bank

May 8, 2025

US-UK Trade Contract: How is Trump’s global tariff talks formed? | International Trade News

May 8, 2025

Bill Gates says he will hand out 99% of his wealth by 2045 | Charity News

May 8, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Health Technology Startup Kouper emerges from $10 million stealth in funding to transform the patient care transition

Did Figma kill Webflow and Framer with the release of the Figma site?

Metaworld Congress 2025: Madrid Takes Center Stage in Digital Innovation

Coinbase wins DeRibit for $2.9 billion and earns a major push to crypto derivatives

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.