Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Is ‘Baby Grok’ the Future of Kids’ AI? Elon Musk Launches New Chatbot

Figma’s Dylan Field will win around $60 million in IPO.

Iran-linked DCHSPY Android malware is equipped with a VPN app that spies against the rebels

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » China-linked hackers launch targeted spy campaigns on Africa’s IT infrastructure
Identity

China-linked hackers launch targeted spy campaigns on Africa’s IT infrastructure

userBy userJuly 21, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 21, 2025Ravi LakshmananBrowser Security/Malware

Spy Campaign on IT Infrastructure in Africa

The China-related cyberspy group, tracked as APT41, is attributed to a new campaign targeting government IT services in the African region.

“The attackers used internal services, IP addresses, and hard coding names for proxy servers embedded within the malware,” said Kaspersky researchers Denis Kulik and Daniil PogoreLov. “One of the C2S [command-and-control servers] It was a prisoner of warlord within the victim’s infrastructure. ”

APT41 is a moniker assigned to China’s nation-state hacking group known for targeting organizations across multiple sectors, including telecoms and energy providers, educational institutions, healthcare organizations and more than three dozen energy companies.

What is noteworthy about the campaign is that, as Russian cybersecurity vendors have pointed out, it focuses on Africa, which has “experienced the most active” from this particular threat actor. That said, the findings line up with previous observations from Trend Micro that the continent has discovered in its crosshairs since late 2022.

Cybersecurity

Kaspersky said the investigation began after “suspecting activities” were found at several workstations associated with the unnamed organization’s IT infrastructure.

“It turns out that the cause of the suspicious activity is a compromised, unsupervised host,” the researchers noted. “Inpackets were executed in the context of the service account. After the ATEXEC and WMIEXEC modules were finished running, the attacker temporarily paused the operation.”

Soon after that, the attacker reportedly harvested the qualifications associated with the privileged account to promote privilege escalation and lateral movement, and eventually deployed a cobalt strike for C2 communication using the DLL sideload.

Malicious DLLs include checks to check the language packs installed on the host and to proceed with execution only if the following language packs are not detected: Japan, Korea (Korea), China (Mainland China), China (Taiwan).

This attack is also characterized by using a SharePoint server hacked for C2 purposes, which uses to send commands executed by C#-based malware uploaded to the victim host.

“They communicated and distributed files named Agents.exe and Agentx.exe via the SMB protocol with the server,” Kaspersky explained. “Each of these files is actually C# Trojan, the main feature of which is to run commands that are received from a web shell named CommandHandler.aspx installed on a SharePoint server.”

This method combines traditional malware deployment with stay tactics in which trustworthy services like SharePoint are transformed into secret control channels. These behaviors make it difficult to detect using only signature-based tools, in line with the techniques classified under Miter ATT&CK, including T1071.001 (Web Protocol) and T1047 (WMI).

Additionally, it was discovered that threat actors were carrying out subsequent activities on machines that were deemed valuable after the initial reconnaissance. This is done by running the cmd.exe command to download from an external resource, downloading a malicious HTML application (HTA) file containing embedded javascript, and using MSHTA.EXE.

The exact nature of payloads delivered via external URLs, Github (“github.githubassets[.]Net”) to avoid detection, currently unknown. However, one analysis of previously distributed scripts shows that it is designed to generate an inverse shell, which gives the attacker the ability to execute commands on the infected system.

Cybersecurity

Also used in the attack is a Steeler and Qualification Harvest utility that collects sensitive data and removes details through a SharePoint server. Some of the tools deployed by the enemy are listed below –

Pillager, although in a modified version, steals credentials from management utilities such as Browser, databases, and Mobaxterm. Source code. Screenshots; Chat sessions and data. Email Messages; SSH and FTP Sessions. A list of installed apps. Output of SystemInfo and task list commands. Check out your account information from chat apps and email clients to steal information about downloaded files and credit card data stored in web browsers such as Yandex, Opera, Opera, Vivaldi, Google Chrome, Brave, CốCCốC. rawcopy Copy raw registry file and dump account credentials to mimikatz

“Attackers are equipped with a wide range of both custom built and public tools,” says Kaspersky. “Specifically, we use penetration testing tools such as cobalt strikes at various stages of the attack.”

“Attackers can quickly adapt to the target infrastructure, update malicious tools to explain certain characteristics. They can also leverage internal services for C2 communication and data removal.”

This manipulation also highlights the blurry lines between the Red Team Tool and the real-world enemy simulation. Threat actors use public frameworks such as Inpacket, Mimikatz, and Cobalt along with custom implants. These overlap pose challenges for detection teams focusing on lateral movement, access to qualifications, and defence evasion across the window environment.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAnduril alumni raises a $24 million Series A to extract military logistics from the Excel spreadsheet era
Next Article Iran-linked DCHSPY Android malware is equipped with a VPN app that spies against the rebels
user
  • Website

Related Posts

Iran-linked DCHSPY Android malware is equipped with a VPN app that spies against the rebels

July 21, 2025

SharePoint 0-Day, Chrome Exploit, macOS Spyware, NVIDIA Toolkit RCE and More

July 21, 2025

Evaluating the role of AI in Zero Trust

July 21, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Is ‘Baby Grok’ the Future of Kids’ AI? Elon Musk Launches New Chatbot

Figma’s Dylan Field will win around $60 million in IPO.

Iran-linked DCHSPY Android malware is equipped with a VPN app that spies against the rebels

China-linked hackers launch targeted spy campaigns on Africa’s IT infrastructure

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Is ‘Baby Grok’ the Future of Kids’ AI? Elon Musk Launches New Chatbot

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.