Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

New Orleans is holding burials of African Americans whose skulls were used in racist studies

Two people were killed in Russian attacks on Ukraine before a possible lecture at Turkiye | News of the Russian-Ukraine War

NAACP invites Memphis officials to stop operations at Xai’s “Dirty Data Center”

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » China’s APT LOTUS PANDA targets government with new Sagerunex backdoor variations
Identity

China’s APT LOTUS PANDA targets government with new Sagerunex backdoor variations

userBy userMarch 5, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 5, 2025Ravi LakshmananCyberspy/Network Security

Chinese apt lotus panda

The threat actor known as the Lotuspanda has been observed to target the government, manufacturing, telecommunications and media sectors of the Philippines, Vietnam, Hong Kong and Taiwan.

“Lotus Blossom has been using Sagerunex backdoors since at least 2016, increasingly adopting a long-term sustainable command shell and developing new variants of the Sagerunex malware suite,” Cisco Talos researcher Joey Chen said in an analysis published last week.

Also known as Billbug, Bronze Elgin, Lotus Blossom, Spring Dragon and Trip, Lotus Panda is suspected of being a Chinese hacking crew that has been active since at least 2009. The threat actor was first exposed by Symantec in June 2018.

Cybersecurity

In late 2022, Symantec, owned by Broadcom, detailed attacks by threat actors against digital certificate authorities and governments and defense agencies in various countries in Asia, including the use of backgrounds such as Hannotog and Sagerunex.

The exact initial access vectors used to violate the entities of the latest intrusion set are unknown, but they have a history of carrying out spear fishing and watering holes attacks. An unspecified attack pathway serves as a conduit for the Sagerunex implant. This is considered an evolution of the old Bilbag malware known as Evora.

This activity is worth noting that it uses two new “beta” variants of malware to avoid detection by leveraging legitimate services such as Dropbox, X, and Zimbra using legal services such as Command and Control (C2) tunnels. They are what you call the things because there is a debug string in the source code.

Chinese apt lotus panda

The backdoor is designed to collect, encrypt, and remove details to remote servers under attacker control. The Dropbox and X versions of Sagerunex are believed to have been in use between 2018 and 2022, but the Zimbra version is said to have been around since 2019.

“The Zimbra webmail version of Sagerunex is not only designed to collect victim information and send it to a Zimbra mailbox, but it is also designed to allow actors to use Zimbra mailing content to give orders and control the victim machine,” Chen said.

“If your mailbox has legitimate command order content, the backdoor downloads the content and extracts the command. Otherwise, the backdoor will delete the content and wait for the legitimate command.”

The results of the command execution are then packaged in the form of RAR archives and attached to the draft folder in the mailbox and the draft email in the trash can.

Cybersecurity

Also deployed in the attack are Cookie Stealer, which harvests Chrome browser credentials, an open source proxy utility named Venom, a program that tunes privileges, and other tools such as bespoke software to compress and encrypt captured data.

Additionally, it has been observed that threat actors perform reconnaissance of the target environment in addition to running commands such as Net, Task List, IPConfig, NetStat and other to perform checks to verify internet access.

“If internet access is restricted, actors have two strategies: establish a connection using the target’s proxy settings, or use the Venom proxy tool to link the isolated machine to an Internet-accessible system,” Talos said.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleIdentity: A New Battlefield of Cybersecurity
Next Article Cold atoms open up new possibilities for quantum experiments
user
  • Website

Related Posts

New Linux flaws allow password hash theft via core dumps in Ubuntu, Rhel, Fedora

May 31, 2025

US DOJ seizes four domains that support cybercrime crypto services in global operations

May 31, 2025

Rust-based Eddiestealer malware steals browser data using Clickfix Captcha Trick

May 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

New Orleans is holding burials of African Americans whose skulls were used in racist studies

Two people were killed in Russian attacks on Ukraine before a possible lecture at Turkiye | News of the Russian-Ukraine War

NAACP invites Memphis officials to stop operations at Xai’s “Dirty Data Center”

Things AI can do, but laws won’t allow: 16 profitable AI ideas big tech won’t touch (but you can)

Trending Posts

Two people were killed in Russian attacks on Ukraine before a possible lecture at Turkiye | News of the Russian-Ukraine War

May 31, 2025

Saudi Arabia says it will fund Syrian salaries in jointly with Qatar | Syrian War News

May 31, 2025

India’s top general admits “loss” in the air in recent conflict with Pakistan | India and Pakistan tension news

May 31, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Things AI can do, but laws won’t allow: 16 profitable AI ideas big tech won’t touch (but you can)

Top Startup and Tech Funding News for the Week Ending May 30, 2025

Where LLMS retrieves real-time data behind AI searches (and why it’s more important than you think)

SpaceX’s Journey to Mars: How Spaceships Use Hohmann Orbital’s Movement from Earth to Mars (and the Physics Behind)

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.