Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

More than 70 organizations in multiple sectors targeted by China-linked cyberspy groups

Google fixes bugs that could reveal users’ private phone numbers

Meta of lectures investing more than $100 billion in Silicon Valley’s top AI startups

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Asian government with Lotus Panda Hack Browser Steeler and Side-Load Malware
Identity

Asian government with Lotus Panda Hack Browser Steeler and Side-Load Malware

userBy userApril 22, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 22, 2025Ravi LakshmananCyber ​​Spy/Threat Intelligence

Browser Steelers and Side Road Malware

The China-related cyberspy group, tracked as a Lotuspanda, was attributed to a campaign that violated several organizations in an unknown Southeast Asian country between August 2024 and February 2025.

“The targets included government ministries, air traffic control organizations, telecommunications operators and construction companies,” Symantec’s threat hunters team said in a new report shared with Hacker News. “The attack involved the use of several new custom tools, including loaders, credential steelers and reverse SSH tools.”

The intrusion set is also said to have targeted air cargo organizations in other countries in Southeast Asia and other neighboring countries.

Cybersecurity

According to Broadcom’s cybersecurity division, the threat cluster is rated as a continuation of a campaign disclosed by the company as a well-known organization in Southeast Asia since at least October 2023.

Then last month, Cisco Talos linked the Lotuspanda actor to the invasion, along with a backdoor known as Sagerunex, to invasions targeting the government, manufacturing, communications and media sectors of the Philippines, Vietnam, Hong Kong and Taiwan.

Lotus Panda (aka Billbug, Bronze Elgin, Lotus Blossom, Spring Dragon, and Trip) has a history of coordinating cyberattacks against governments and military organizations in Southeast Asia.

The group, considered active since at least 2009, reads it in June 2015 when Palo Alto Networks exploded backdoor dubbed Elise (AKA Trensil), due to a permanent spear phishing campaign in which threat actors exploded Microsoft’s office flaws (CVE-2012-0158).

A subsequent attack, attached by the group, Microsoft’s Windows Ole flaw (CVE-2014-6332) weaponized the weapon via Booby-confined attachments sent in a spear phishing email, then worked for the French Ministry of Foreign Affairs in Taiwan to deploy another Trojan horse associated with Elise Codenamed Emissary.

In the latest wave of attacks discovered by Symantec, attackers leverage legitimate executables from Trend Micro (“TMDBGlog.exe”) and BitDefender (“Bds.exe”) to work to revive the loader, revive the loader, and launch the next stepped wages embedded within the stored file.

Cybersecurity

The exact nature of the file is unknown, but the BitDefender binaries are also used to sideload another DLL. Another unknown aspect of the campaign is the initial access vector used to reach the entity in question.

This attack paved the way for an updated version of Sagerunex, a tool used only by Lotus Panda. It has the ability to collect host information on targets, encrypt it, and remove details from external servers under attacker control.

Also deployed in the attack are the reverse SSH tool and two-qualified steelers, Chromekatz and CredentyKatz, which are equipped to smoke passwords and cookies stored in the Google Chrome web browser.

“The attacker deployed the publicly available Zrok Peer-to-Peer tool to provide remote access to internally exposed services using the tool’s sharing functions,” Symantec said. “Another legitimate tool used was called “DateChanger.exe.” Perhaps you can change the timestamp of the file to muddy the water for incident analysts.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTrump supports Hegses after reporting a second signal chat on Yemen’s strike | Donald Trump News
Next Article Palestinian activist Halil denied the release of his son’s birth, his wife says | Israeli-Palestinian conflict news
user
  • Website

Related Posts

More than 70 organizations in multiple sectors targeted by China-linked cyberspy groups

June 9, 2025

Chrome 0-Day, Data Wipers, Misused Tools and Zero-Click iPhone Attacks

June 9, 2025

Do you think your IDP or CASB is hiding it? These five risks prove not to

June 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

More than 70 organizations in multiple sectors targeted by China-linked cyberspy groups

Google fixes bugs that could reveal users’ private phone numbers

Meta of lectures investing more than $100 billion in Silicon Valley’s top AI startups

Galaxy Ventures Backs Rise Chain, $8 million raised to launch the fastest zone for real-time apps on Ethereum

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meta of lectures investing more than $100 billion in Silicon Valley’s top AI startups

Galaxy Ventures Backs Rise Chain, $8 million raised to launch the fastest zone for real-time apps on Ethereum

Founders of Layerzero, SEI, Selini Capital and Plume Back Hyper-Personalized AI Crypto Discovery Engine

Should the government ban AI-generated humans to stop the collapse of social trust?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.