Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

Eightfold Co-Founder Raises $35M for Viven, AI Digital Twin Startup Contacts Missed Colleagues

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Confucius hackers hit Pakistan with new Wooperstealer and Anonymous malware
Identity

Confucius hackers hit Pakistan with new Wooperstealer and Anonymous malware

userBy userOctober 2, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 2, 2025Ravi LakshmananMalware/Cyberspy

The threat actor known as Confucius is attributed to a new phishing campaign targeting Pakistan, which has malware families such as Wooperstealer and Anondoor.

“For the past decade, Confucius has repeatedly targeted government agencies, military organizations, defense contractors, especially important industries in Pakistan.

Confucius has been active since 2013 and is a long-term hacking group believed to be active throughout South Asia. A recent campaign conducted by threat actors employs a Python-based backdoor called Anondoor, showing the group’s evolution of commerce and its technical agility.

DFIR Retainer Service

One of the attack chains targeted at Pakistani users in December 2024 will trick the recipient into opening a .ppsx file and use DLL sideload technology to trigger the delivery of WooperSteler.

The subsequent attack wave, observed in March 2025, unleashed the malicious Wooperstealer DLL using a Windows shortcut (.lnk) file, then rebooted using DLL sideloads, and stole sensitive data from the compromised host.

Another .lnk file discovered in August 2025 utilized similar tactics to remove the malformed dlls. This time, DLL opens the way to Anondoor. This is waiting for further tasks to remove device information to an external server and execute commands, screenshots, screenshots, and directory passwords.

It is worth noting that the use of threat actor Anondoor was documented in July 2025 by SeeBug’s known Sec 404 team.

“This group has tweaked that toolset to demonstrate strong adaptability, avoid detection, adjust its toolset and change the prioritization of intelligence collection,” Fortinet said. “Recent campaigns have demonstrated Confucius’ sustainability as well as its ability to pivot quickly among its methods, infrastructure and malware families, maintaining operational effectiveness.”

CIS Build Kit

Disclosure occurs when the K7 Security Lab details infection sequences associated with patchwork groups in detail. This starts with a malicious macro designed to download additional payloads, leverage DLL sideload to launch primary malware, and simultaneously download PowerShell code that takes advantage of DLL sideload while simultaneously displaying decoy PDF documents.

The final payload establishes contact with the threat actor’s command and control (C2) server, collects system information, and retrieves encoded instructions that are decrypted to execute using CMD.exe. It also has equipment to take screenshots, upload files from your machine, download files from a remote URL, and save them locally in a temporary directory.

“Malware waits for a configurable period to resend data up to 20 times, tracking out failures and ensuring persistent, stealth data removal without warning users or security systems,” the company said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOpenai is the most valuable private company in the world after private stock sales
Next Article The new A16Z report considers that AI company startups are actually paying
user
  • Website

Related Posts

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

October 15, 2025

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

October 15, 2025

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

Eightfold Co-Founder Raises $35M for Viven, AI Digital Twin Startup Contacts Missed Colleagues

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.