Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

OpenClaw integrates VirusTotal scanning to detect malicious ClawHub skills

Kids ‘picked last in gym class’ prepare for Super Bowl

NBA star Giannis Antetokounmpo joins Calci as an investor

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers use Snappybee malware and Citrix vulnerability to infiltrate European telecom networks
Identity

Hackers use Snappybee malware and Citrix vulnerability to infiltrate European telecom networks

userBy userOctober 21, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 21, 2025Ravi LakshmananCyber ​​espionage / network security

Snappybee malware and Citrix flaws

A European telecommunications organization is said to have been targeted by threat actors affiliated with a Chinese-aligned cyber-espionage group known as Salt Typhoon.

According to Darktrace, the organization was targeted in the first week of July 2025, and the attackers gained initial access by exploiting the Citrix NetScaler Gateway appliance.

Salt Typhoon, also known as Earth Estries, FamousSparrow, Ghostemperor, and UNC5807, is the name given to an advanced persistent threat actor with ties to China. The group has been known to be active since 2019 and rose to prominence last year following attacks on telecommunications service providers, energy networks, and government systems in the United States.

This attacker has a track record of exploiting security flaws in edge devices, maintaining deep persistence, and exfiltrating sensitive data from victims in more than 80 countries across North America, Europe, the Middle East, and Africa.

In this incident observed against a European telecommunications operator, the attackers allegedly used that foothold to move to Citrix Virtual Delivery Agent (VDA) hosts in the client’s Machine Creation Services (MCS) subnet, while simultaneously using SoftEther VPN to hide their true origin.

DFIR retainer service

One of the malware families delivered as part of the attack is Snappybee (aka Deed RAT), which appears to be a successor to the ShadowPad (aka PoisonPlug) malware introduced in the previous Salt Typhoon attack. The malware is launched using a technique called DLL sideloading. This technique has been adopted by many Chinese hacking groups over the years.

“The backdoor was delivered to these internal endpoints as a DLL, along with legitimate executables from antivirus software such as Norton Antivirus, Bkav Antivirus, and IObit Malware Fighter,” Darktrace said. “This pattern of activity indicates that the attackers rely on DLL sideloading through legitimate antivirus software to execute their payloads.”

This malware is designed to connect to an external server (‘aar.gandhibludtric’).[.]Darktrace said the intrusion was identified and remediated before it escalated further.

“Salt Typhoon continues to challenge defenders with its stealth, tenacity, and misuse of legitimate tools,” the company added. “The evolving nature of Salt Typhoon tradecraft and its ability to reuse trusted software and infrastructure ensure that it will continue to be difficult to detect using traditional methods alone.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleA pair of ‘sacred’ islands in an eerie green African lake holds centuries-old relics and a mummified emperor — Earth as seen from space
Next Article Google identifies three new Russian malware families created by COLDRIVER hackers
user
  • Website

Related Posts

OpenClaw integrates VirusTotal scanning to detect malicious ClawHub skills

February 8, 2026

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

February 7, 2026

The Legal Revolution is Digital: Meet TwinH, Your AI Partner in the Courtroom of the Future

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

OpenClaw integrates VirusTotal scanning to detect malicious ClawHub skills

Kids ‘picked last in gym class’ prepare for Super Bowl

NBA star Giannis Antetokounmpo joins Calci as an investor

New York state lawmaker proposes three-year moratorium on new data centers

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.