Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Unprecedented radio observations of the Milky Way took more than 40,000 hours to build — Space Photo of the Week

Can animals without brains think? |Live Science

Is Wall Street losing faith in AI?

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » China-linked tick group exploits Lanscope zero-day to take over corporate systems
Identity

China-linked tick group exploits Lanscope zero-day to take over corporate systems

userBy userOctober 31, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 31, 2025Ravi LakshmananEndpoint security/cyber espionage

The recently revealed exploitation of a critical security flaw in Motex Lanscope Endpoint Manager is believed to be the work of a cyber espionage group known as Tick.

This vulnerability is tracked as CVE-2025-61932 (CVSS score: 9.3) and allows remote attackers to execute arbitrary commands with SYSTEM privileges on the on-premises version of the program. In an alert issued this month, JPCERT/CC said it had seen reports of security flaws being actively exploited to drop backdoors into compromised systems.

Tick, also known as Bronze Butler, Daserf, REDBALDKNIGHT, Stalker Panda, Stalker Taurus, and Swirl Typhoon (formerly known as Tellur), is a suspected Chinese cyberespionage operation known for its extensive targeting of East Asia, particularly Japan. It is estimated that it has been active since at least 2006.

DFIR retainer service

This sophisticated campaign observed by Sophos involved exploiting CVE-2025-61932 to deliver a known backdoor called Gokcpdoor, which acts as a backdoor to establish a proxy connection with a remote server and execute malicious commands on a compromised host.

“The 2025 variant removes support for the KCP protocol and adds multiplexing using a third-party library.” [smux] For C2 [command-and-control] communications,” the Sophos Threat Countermeasures Unit (CTU) said in a report Thursday.

The cybersecurity firm announced that it has detected two different types of Gokcpdoor that serve different use cases.

A server type that listens for incoming client connections to enable remote access A client type that initiates a connection to a hard-coded C2 server for the purpose of setting up a covert communication channel

This attack also features the deployment of the Havoc post-exploit framework on some systems, and the infection chain relies on DLL sideloading to launch a DLL loader named OAED Loader to inject the payload.

Other tools utilized in the attack to facilitate lateral movement and data exfiltration include Goddi, an open source Active Directory information dumping tool. Remote Desktop: For remote access through backdoor tunnels. and 7-Zip.

CIS build kit

Threat actors have also been found to access cloud services such as io, LimeWire, and Piping Server via web browsers during remote desktop sessions to exfiltrate collected data.

This is not the first time Tick has been observed leveraging zero-day flaws in attack campaigns. In October 2017, Secureworks, a Sophos company, detailed how a group of hackers had exploited a then-unpatched remote code execution vulnerability (CVE-2016-7836) in Japanese IT asset management software SKYSEA Client View to compromise machines and steal data.

“Organizations upgrade vulnerable Lanscope servers depending on their environment,” Sophos TRU said. “Organizations should also review Internet-facing Lanscope servers that have Lanscope client programs (MRs) or detection agents (DAs) installed to determine whether there is a business need to make them publicly available.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNew study highlights gender disparities in sepsis treatment
Next Article Expanding AI collaboration with Nvidia, Hyundai, Samsung, SK, and Naver
user
  • Website

Related Posts

Microsoft discovers ‘whisper leak’ attack that identifies AI chat topics in encrypted traffic

November 8, 2025

Samsung’s zero-click flaw is exploited to deploy LANDFALL Android spyware via WhatsApp

November 7, 2025

From Log4j to IIS, Chinese hackers turn legacy bugs into global spying tools

November 7, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Unprecedented radio observations of the Milky Way took more than 40,000 hours to build — Space Photo of the Week

Can animals without brains think? |Live Science

Is Wall Street losing faith in AI?

‘Breaking Bad’ creator’s new show ‘Pluribus’ emphasizes that it was ‘created by humans’, not AI

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.