Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Fortinet patches critical SQLi flaw that allows unauthenticated code execution

MrBeast’s company acquires Gen Z-focused fintech app Step

Databricks CEO says SaaS isn’t dead, but AI will soon make it worthless

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Chinese apt deploys egg stream fireless malware to infringe Philippine military systems
Identity

Chinese apt deploys egg stream fireless malware to infringe Philippine military systems

userBy userSeptember 10, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 10, 2025Ravi LakshmananCybersecurity/Malware

China's apt

The Advanced Persistent Threat (APT) group from China is attributed to a compromise by a Philippines-based military company using a previously undocumented fies-less malware framework called Eggstreme.

“This multi-stage toolset delivers sustained and modest espionage by injecting malicious code directly into memory and leveraging DLL sideloads to execute payloads,” Bitdefender researcher Bogdan Zavadovschi said in a report shared with Hacker News.

“The core component, the Egg Stremy-grade, is a full-featured backdoor that allows for extensive system reconnaissance, lateral movement, and data theft through injected keyloggers.”

The targeting of the Philippines is like a recurring pattern of Chinese state-sponsored hacking groups in light of geopolitical tensions driven by the South China Sea territorial disputes between China, Vietnam, the Philippines, Taiwan, Malaysia and Brunei.

Audit and subsequent

However, the latest activity is not attributed to known Chinese hacking groups. “We put a considerable amount of effort into our belonging efforts, but we couldn’t find anything,” Martin Zugec, director of technical solutions at Bitdefender, told Hacker News. “However, the objective is consistent with the appropriate one in China. In this regard, our attribution is based on interest/purpose.”

Romanian cybersecurity vendors, which first detected signs of malicious activity in early 2024, described the egg stream as a closely integrated set of malicious components designed to establish a “resilient scaffolding” for infected machines.

The starting point for multi-stage operations is a payload called eggstremefuel (“mscorsvc.dll”), which performs system profiling, deploys the eggs stremeloader to set sustainability, runs the eggs streme loader, and deploys the eggs streme loader that runs the eggs streme senste.

Eggstremefuel’s functionality is achieved by opening active communication channels in Command and Control (C2) and making it possible –

Start CMD.exe to retrieve drive info, establish communication through a pipe to gracefully close all connections, read files from the server, save them to disk, read local files from a specific path, send content and send external IP address by making a request to MyExternAlip[.]com/raw Dump in-memory configuration to disk

Calling Eggstremeagent the framework’s “CNS” backdoors monitor new user sessions and inject each session with a KeyLogger component called EggstremekeyLogger to harvest keystrokes and other sensitive data. It communicates with the C2 server using the Google Remote Procedure Call (GRPC) protocol.

It supports impressive 58 commands including the auxiliary Implant Kounums Bat Egg Stremigers (“xwizards.dll”) by enabling a wide range of functions and facilitating local and network discovery, system enumeration, arbitrary shellcode execution, privilege escalation, lateral movement, data removal, and payload injection.

“Attackers use this to launch legal binaries that sideload malicious dlls, which is a technique that is consistently exploited across the attack chain,” Zabadowski pointed out.

CIS Build Kit

“This secondary backdoor provides reverse shell access and file upload/download capabilities. Its design also incorporates a list of multiple C2 servers to increase resilience and to maintain communication with the attacker even when a single C2 server is filmed offline.”

This activity is also characterized by using a storeway proxy utility to establish a foothold for the internal network. More complex detection is the clever nature of the framework, loading and executing malicious code directly into memory without leaving traces on disk.

“This, coupled with the heavy use of DLL sideloads and sophisticated multi-stage execution flows, makes the framework work inconspicuous and a critical and lasting threat,” Bitdefender said.

“The Eggstreme Malware family is a highly refined, multicomponent threat designed to achieve sustained access, lateral movement, and data removal. Threat actors demonstrate a sophisticated understanding of modern defense techniques by employing a variety of tactics to avoid detection.”

(The story was updated after publication to include additional insights from BitDefender.)


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCanada’s 2023 wildfires contributed to 87,000 early deaths worldwide, research estimates
Next Article “Our Heart Stopped”: Scientists Discovered that a baby pterosaur died in a fierce Jurassic storm 150 million years ago, dead
user
  • Website

Related Posts

Fortinet patches critical SQLi flaw that allows unauthenticated code execution

February 10, 2026

China-linked UNC3886 targets Singapore’s telecom sector with cyber espionage

February 9, 2026

SolarWinds Web Help Desk exploited by RCE in multi-stage attack against public servers

February 9, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Fortinet patches critical SQLi flaw that allows unauthenticated code execution

MrBeast’s company acquires Gen Z-focused fintech app Step

Databricks CEO says SaaS isn’t dead, but AI will soon make it worthless

ChatGPT advertises | Tech Crunch

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.