Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Over 250 Magento stores hit overnight as hackers exploit new flaw in Adobe Commerce

Why Cohere’s former head of AI research is betting on expansion

OpenAI requests memorial attendee list in ChatGPT suicide lawsuit

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers use Neursite and NeuralExecutor malware to identify PassiveNeuron APT
Identity

Researchers use Neursite and NeuralExecutor malware to identify PassiveNeuron APT

userBy userOctober 22, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 22, 2025Ravi LakshmananCyber ​​espionage / network security

Government, financial, and industrial organizations in Asia, Africa, and Latin America are being targeted by a new campaign called “PassiveNeuron,” according to Kaspersky Lab’s findings.

The cyber espionage campaign was first flagged by a Russian cybersecurity vendor in November 2024, and in June revealed a series of attacks targeting government agencies in Latin America and East Asia using a never-before-seen malware family tracked as Neursite and NeuralExecutor.

He also said the operation demonstrated a high degree of sophistication, with the attackers using previously compromised internal servers as intermediate command and control (C2) infrastructure to fly under the radar.

“Threat actors can move laterally within the infrastructure to steal data, optionally creating virtual networks that allow attackers to steal desired files even from machines isolated from the internet,” Kaspersky noted at the time. “The plugin-based approach allows us to dynamically adapt to the attacker’s needs.”

DFIR retainer service

The company has since stated that a new wave of infections related to PassiveNeuron has been observed since December 2024 and continues until August 2025. Although the cause of this campaign is unknown at this stage, there are some indications that it is the work of Chinese-speaking attackers.

In at least one incident, attackers allegedly obtained initial remote command execution capabilities via Microsoft SQL on a compromised machine running Windows Server. Exactly how this is accomplished is unknown, but the attacker may be brute-forcing administrative account passwords, exploiting SQL injection flaws in applications running on the server, or unidentified vulnerabilities in the server software itself.

Regardless of the method used, the attacker attempted to introduce an ASPX web shell to gain basic command execution functionality. When these efforts failed, the intruder witnessed the delivery of a sophisticated implant via a series of DLL loaders placed in the System32 directory. These include –

Neursite, a custom-built C++ modular backdoor NeuralExecutor, a custom-built .NET implant used to download and execute additional .NET payloads over TCP, HTTP/HTTPS, named pipes, or WebSockets Cobalt Strike, a legitimate adversary simulation tool

Neursite utilizes built-in configuration to connect to C2 servers and uses TCP, SSL, HTTP, and HTTPS protocols for communication. By default, it supports the ability to collect system information, manage running processes, and proxy traffic through other backdoor-infected machines for lateral movement.

CIS build kit

The malware also includes components that fetch auxiliary plugins for shell command execution, file system management, and TCP socket manipulation.

Kaspersky also pointed out that the NeuralExecutor variant discovered in 2024 was designed to obtain the C2 server address directly from the configuration, while the artifact discovered this year accesses a GitHub repository to obtain the C2 server address, a technique known as a dead drop resolver technique.

“The PassiveNeuron campaign is unique in that it primarily targets server machines,” researchers Georgy Kucherin and Saurabh Sharma said. “These servers, especially those exposed to the internet, are usually lucrative targets. [advanced persistent threats]This is because it can act as a gateway to the targeted organization. ”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHow can companies move forward?
Next Article Why you need to exchange passwords and passphrases
user
  • Website

Related Posts

Over 250 Magento stores hit overnight as hackers exploit new flaw in Adobe Commerce

October 23, 2025

Iran-linked Muddy Water targets over 100 organizations in global espionage campaign

October 22, 2025

Ukraine aid group targeted through fake Zoom meetings and weaponized PDF files

October 22, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Over 250 Magento stores hit overnight as hackers exploit new flaw in Adobe Commerce

Why Cohere’s former head of AI research is betting on expansion

OpenAI requests memorial attendee list in ChatGPT suicide lawsuit

OpenAI’s Atlas is more focused on ChatGPT than the web

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.