Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

Sequoia bets on silence | TechCrunch

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Chinese hackers abuse IPv6 SLAAC against AITM attacks via lateral movement of spell binder
Identity

Chinese hackers abuse IPv6 SLAAC against AITM attacks via lateral movement of spell binder

userBy userApril 30, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 30, 2025Ravi LakshmananMalware/DNS Security

A highly persistent threat (APT) group located in China called TheWizards is linked to a lateral movement tool called Spellbinder, which can promote middle (AITM) attacks.

“The spellbinder allows intermediate (AITM) attacks via IPv6 stateless address AutoconFiguration (SLAAC) spoofing, allowing it to travel sideways on compromised networks, intercept packets, redirect legal Chinese software traffic, and allow attackers to download malicious updates from servers that Mr. under said.”

This attack paves the way for malicious downloaders delivered by hijacking the software update mechanism associated with Sogou Pinyin. The downloader then acts as a conduit for dropping a wizard net called a modular backdoor code name.

This is not the first time a Chinese threat actor has abused the software update process for Sogou Pinyin to provide its own malware. In January 2024, ESET detailed a hacking group called Blackwood that deployed an implant named NSPX30 by leveraging the update mechanism of Chinese input method software applications.

Cybersecurity

Then earlier this year, Slovak cybersecurity company revealed another threat cluster known as Plushdaemon, which utilized the same technique to distribute custom downloaders called Littledaemon.

The Wizards APT is known to target both individuals and gambling sectors in Cambodia, Hong Kong, mainland China, the Philippines and the United Arab Emirates.

It suggests that the Spellbinder IPv6 AITM tool has been used by threat actors since at least 2022. The exact initial access vector used in the attack is unknown at this stage, but the delivery of a ZIP archive containing four different files continues.

Threat parties will install “winpcap.exe” and run “avgaapplicationframehost.exe”. The DLL file then reads the shellcode from “log.dat”, runs it in memory, and launches the spellbinder in the process.

“Spellbinder uses the WinPCap library to capture packets and respond to packets when necessary,” explained Muñoz. “We can use IPv6’s Network Discovery Protocol to advertise the presence of IPv6-enabled routers in our network, and we are recruiting hosts or IPv6-enabled routers, so we can employ advertising devices as debt notifications.”

In one attack case observed in 2024, the threat actors are said to have used this method to provide a Trojanized version that provides a Trojanned Net that hijacks the Tencent QQ software update process at the DNS level to deliver a Trojanned Net that deploys equipped modular backdoors to receive and run .NET payloads in infected hosts.

Spellbinder turns this off by intercepting DNS queries for software update domains (“update.browser.qq[.]Issuing a DNS response using the IP address of the attacker control server (” 43.155.62[.]54″) Hosting malicious updates.

Cybersecurity

Another notable tool for TheWizards ‘Arsenal is Darknights. This is due to another Chinese hacking group, also known as Darknimbus by Trend Micro, which was tracked as Earth Minotaur. That being said, both clusters are treated as independent operators, citing differences in tools, infrastructure, and targeting footprints.

Since then, Sichuan Dianke Network Security Technology Co., Ltd. It has been revealed that a contractor from China’s Ministry of Public Safety, known as UPSEC, is a supplier of Darknimbus Malware.

“TheWizards uses a backdoor for Windows (WizardNet), but the hijacking server is configured to provide a Dark Knight for updates to applications running on Android devices,” says Muñoz. “This shows that Dianke Network Security is a digital quartermaster for TheWizards APT group.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFact-check Trump’s allegations at a 100-day rallies in Michigan | Donald Trump News
Next Article Supreme Court hears discussions about Oklahoma Publicly funded religious schools
user
  • Website

Related Posts

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

July 12, 2025

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

July 12, 2025

Fortinet releases patches for important SQL injection defects in Fortiweb (CVE-2025-25257)

July 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

Sequoia bets on silence | TechCrunch

Windsurf CEO goes to Google. Openai’s acquisition is falling apart

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.