Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Promoting global and environmental health research in Canada

India’s Kuku nabs $85 million as mobile content wars heat up

CISA reports flaw in Adobe AEM with perfect 10.0 score – already under active attack

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » China’s hacker red noveler target global government using pantegana and cobalt strike
Identity

China’s hacker red noveler target global government using pantegana and cobalt strike

userBy userSeptember 24, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 24, 2025Ravi LakshmananVulnerability/Network Security

The suspected cyberespionage cluster, previously discovered to target global government and private sector organizations across Africa, Asia, North America, South America and Oceania, is rated as a state-sponsored threat actor.

Recorded Future, who was tracking activities under the Moniker Tag-100, graduated to a hacking group called Rednovember. It is also tracked by Microsoft as Storm-2077.

“Between June 2024 and June 2025, Rednovember (which overlaps with Storm-2077) targeted targeting target appliances from high-profile organizations around the world, using GO-based backdoor pantegana and cobalt strikes as part of the invasion.”

DFIR Retainer Service

“The group expanded target authority across government and private sector organizations, including defense and aerospace organizations, space organizations, and law firms.”

Some of the new victims of threat leaders include the Central Asian Ministry of Foreign Affairs, the African National Security Agency, the European Government Bureau, and the Southeast Asian government. The group is also believed to have violated at least two US (US) defense contractors, European engine manufacturers, and intergovernmental cooperation agencies focusing on trade in Southeast Asia.

Rednovember, first documented by Future, recorded more than a year ago, detailed the post-Pantegana post-explosion framework and use of sparkrats following the weaponization of known security flaws in several internet-facing boundary appliances from Checkpoint (CVE-2024-24919), Cisco, Citrix, F5, Ivanti and Palo Altolksoves. (CVE-2024-3400), and initial access to SonicWall.

The focus on targeting security solutions such as VPNs, firewalls, load balancers, virtualization infrastructure, and email servers reflects the trends that other China-sponsored hacking groups have entered networks of interest and are increasingly being adopted to maintain long-term sustainability.

A notable aspect of the commerciality of threat actors is the use of pantegana and sparkrats, both open source tools. Recruitment is an attempt to reuse existing programs for their interests and disrupt the attribution efforts that are characteristic of spyers.

The attack uses a publicly available variant of the Go-based loader, Leslieloader, to fire a Spark Rat or Cobalt Strike beacon on the compromised device.

Rednovember is said to use VPN services such as ExpressVPN and Warp VPN to use internet-facing devices, and manage and connect to two servers that communicate with Pantegana, Spark Rat and Cobalt Strike.

CIS Build Kit

Between June 2024 and May 2025, many of the hacking group’s targeting efforts focused on Panama, the US, Taiwan and South Korea. In April 2025, it has been recently found to target safe appliances associated with US-based newspapers and engineering and military contractors.

Recorded Future also said it had identified enemies that likely targeted the Microsoft Outlook Web Access (OWA) portal belonging to a South American country before it visited China.

“Rednovember has historically targeted a diverse range of countries and sectors, suggesting a wide range of intelligence requirements,” the company said. “Rednovender’s activities so far have focused primarily on several key regions, including the US, Southeast Asia, the Pacific region and South America.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGoogle makes real-world data more accessible with AI.
Next Article Raw Microscope Baby Sea Sea Sea Sea Sea Sea Sea is one of the video winners of the Nikon Small World In Motion Competition
user
  • Website

Related Posts

CISA reports flaw in Adobe AEM with perfect 10.0 score – already under active attack

October 16, 2025

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

October 15, 2025

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Promoting global and environmental health research in Canada

India’s Kuku nabs $85 million as mobile content wars heat up

CISA reports flaw in Adobe AEM with perfect 10.0 score – already under active attack

Seoul considers approving high-resolution map requests from Google and Apple

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.