Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Taco Bell rethinks about relying on AI at drive-thru

The fall of EV startup Fisker: A comprehensive timeline

I was really impressed with this $400 portable projector

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » State-backed HagyBeacon malware uses AWS Lambda to steal data from SE Asian government
Identity

State-backed HagyBeacon malware uses AWS Lambda to steal data from SE Asian government

userBy userJuly 15, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 15th, 2025Ravi LakshmananCyber Spy/Threat Intelligence

Government organizations in Southeast Asia are targeting new campaigns aimed at collecting sensitive information using previously undocumented Windows backdoors.

This activity is tracked by Palo Alto Networks Unit 42, where “CL” represents “cluster” and “STA”, “CL” represents “motivation for state responsibility”, and “CL” represents “CL”.

“The threat actors behind this cluster of activity are collecting sensitive information from government agencies, including information on recent tariffs and trade disputes,” security researcher Rior Rochberger said in an analysis Monday.

Southeast Asia is becoming a cyberspy focus due to its role in sensitive trade negotiations, military modernization, and strategic alignment in US-China power dynamics. Targeting government agencies in this region can provide valuable information on foreign policy directions, infrastructure plans, and changes in internal regulations affecting regional and global markets.

Cybersecurity

The exact initial access vector used to deliver malware is currently unknown, but it indicates that the use of DLL sideload technology will be deployed to compromised hosts. Specifically, it includes planting a malicious version of the dll called “Mscorsvc.dll” and planting it with the legitimate Windows executable “mscorsvw.exe”.

Once the binary is launched, the DLL can establish communication with the attacker control URL and run any command to download additional payloads. Persistence is achieved by a service that ensures that the DLL is started even after a system restart.

It is worth noting that HagyBeacon utilizes Amazon Web Services (AWS) Lambda URLs for command and control (C2) purposes.

“The AWS Lambda URL is an AWS Lambda feature that allows users to call serverless functions directly via HTTPS,” explained Rochberger. “This technique uses legal cloud capabilities to clearly hide the gaze, creating reliable, scalable and difficult to detect communication channels.”

Defenders are *.lambda-url, especially when started by unusual binary or system services. *. You need to pay attention to outbound traffic to rarely used cloud endpoints like Amazonaws.com. While AWS usage itself is not questionable, context-conscious baselines can help distinguish between malware and legal activities that leverage cloud-native avoidance, such as the origins of correlation processes, parent-child execution chains, and endpoint behavior.

Downloaded from within the payload are file collector modules and time ranges responsible for harvesting files matching a particular set of extensions (doc, docx, xls, xlsx, and pdf). This includes attempts to search for files related to recent US-imposed tariff measures.

Cybersecurity

Threat actors are also known to employ other services such as Google Drive and Dropbox as their Exfiltration channels to send collected data in fusion with regular network traffic. The incident analyzed in Unit 42 reportedly blocked attempts to upload files to a cloud storage service.

In the final stage, the attacker runs a cleanup command to avoid leaving traces of activity, deleting all archives of staged files and other payloads that were downloaded during the attack.

“Threat actors used HagyBeacon as their primary tool to maintain their foothold and collect sensitive information from affected government agencies,” Rochberger said. “The campaign highlights that attackers continue to find new ways to exploit legal and trustworthy cloud services.”

HagyBeacon uses trusted platforms as secret channels and uses tactics called “living away from trustworthy services” (lot) to reflect a wider trend in advanced persistent threats. As part of this cloud-based malware cluster, similar techniques have been observed in threats using Google Workspace, Microsoft Teams, or Dropbox APIs, to avoid detection and promote persistent access.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe shuttle in Shion became electricity so “the smog is gone.”
Next Article Merger of the largest black holes detected by Ligo-Virgo-Kagra
user
  • Website

Related Posts

Attackers abuse Velociraptor’s forensic tools for deploying Visual Studio code for C2 tunneling

August 30, 2025

Whatsapp Issues Zero-Click Exploit Emergency Updates iOS and Macos Device Targeting

August 30, 2025

Whatsapp Issues Zero-Click Exploit Emergency Updates iOS and Macos Device Targeting

August 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Taco Bell rethinks about relying on AI at drive-thru

The fall of EV startup Fisker: A comprehensive timeline

I was really impressed with this $400 portable projector

Attackers abuse Velociraptor’s forensic tools for deploying Visual Studio code for C2 tunneling

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Unlocking Tomorrow’s Health: Medical Device Integration

Web 3.0’s Promise: What Sir Tim Berners-Lee Envisions for the Future of the Internet

TwinH’s Paves Way at Break The Gap 2025

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.