Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

TikTok robot star Rizzbot gave me the middle finger

India, where BlaBlaCar once exited, is now its largest market.

Obvious security risks of AI browser agents

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers use Snappybee malware and Citrix vulnerability to infiltrate European telecom networks
Identity

Hackers use Snappybee malware and Citrix vulnerability to infiltrate European telecom networks

userBy userOctober 21, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 21, 2025Ravi LakshmananCyber ​​espionage / network security

Snappybee malware and Citrix flaws

A European telecommunications organization is said to have been targeted by threat actors affiliated with a Chinese-aligned cyber-espionage group known as Salt Typhoon.

According to Darktrace, the organization was targeted in the first week of July 2025, and the attackers gained initial access by exploiting the Citrix NetScaler Gateway appliance.

Salt Typhoon, also known as Earth Estries, FamousSparrow, Ghostemperor, and UNC5807, is the name given to an advanced persistent threat actor with ties to China. The group has been known to be active since 2019 and rose to prominence last year following attacks on telecommunications service providers, energy networks, and government systems in the United States.

This attacker has a track record of exploiting security flaws in edge devices, maintaining deep persistence, and exfiltrating sensitive data from victims in more than 80 countries across North America, Europe, the Middle East, and Africa.

In this incident observed against a European telecommunications operator, the attackers allegedly used that foothold to move to Citrix Virtual Delivery Agent (VDA) hosts in the client’s Machine Creation Services (MCS) subnet, while simultaneously using SoftEther VPN to hide their true origin.

DFIR retainer service

One of the malware families delivered as part of the attack is Snappybee (aka Deed RAT), which appears to be a successor to the ShadowPad (aka PoisonPlug) malware introduced in the previous Salt Typhoon attack. The malware is launched using a technique called DLL sideloading. This technique has been adopted by many Chinese hacking groups over the years.

“The backdoor was delivered to these internal endpoints as a DLL, along with legitimate executables from antivirus software such as Norton Antivirus, Bkav Antivirus, and IObit Malware Fighter,” Darktrace said. “This pattern of activity indicates that the attackers rely on DLL sideloading through legitimate antivirus software to execute their payloads.”

This malware is designed to connect to an external server (‘aar.gandhibludtric’).[.]Darktrace said the intrusion was identified and remediated before it escalated further.

“Salt Typhoon continues to challenge defenders with its stealth, tenacity, and misuse of legitimate tools,” the company added. “The evolving nature of Salt Typhoon tradecraft and its ability to reuse trusted software and infrastructure ensure that it will continue to be difficult to detect using traditional methods alone.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleA pair of ‘sacred’ islands in an eerie green African lake holds centuries-old relics and a mummified emperor — Earth as seen from space
Next Article Google identifies three new Russian malware families created by COLDRIVER hackers
user
  • Website

Related Posts

Smishing Triad links to 194,000 malicious domains in global phishing operation

October 24, 2025

Critical, newly patched Microsoft WSUS flaw exploited

October 24, 2025

APT36 targets Indian government with Golang-based DeskRAT malware campaign

October 24, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

TikTok robot star Rizzbot gave me the middle finger

India, where BlaBlaCar once exited, is now its largest market.

Obvious security risks of AI browser agents

This week in science news: Comets light up the sky and hurtle toward the sun, our galaxy’s mysterious glow is explained, and scientists say why time moves faster as we get older

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.