Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » French authorities are launching an operation to remove the PlugX malware from infected systems
Global Security

French authorities are launching an operation to remove the PlugX malware from infected systems

AdminBy AdminJuly 27, 2024No Comments3 Mins Read
PlugX Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


July 27, 2024Information hallMalware / Cyber ​​​​Intelligence

PlugX malware

French judicial authorities, in cooperation with Europol, launched a so-called “disinfection operation” to rid compromised hosts of a known malware called PlugX.

Paris Prosecutor’s Office, Parquet de Paris, said the initiative was launched on July 18 and is expected to continue for “several months.”

It goes on to say that around a hundred victims in France, Malta, Portugal, Croatia, Slovakia and Austria have already benefited from clean-up efforts.

The development comes nearly three months after French cybersecurity firm Sekoia opened in September 2023, he took down the command and control (C2) server associated with the PlugX Trojan, spending $7 to obtain an IP address. It is also noted that nearly 100,000 unique public IP addresses send PlugX requests to the hijacked domain every day.

Cyber ​​security

PlugX (aka Korplug) is a Remote Access Trojan (RAT) that has been widely used by China-nexus threat actors since at least 2008 along with other malware families such as Gh0st RAT and ShadowPad.

The malware is typically launched on compromised hosts using DLL sideloading techniques, allowing threat actors to execute arbitrary commands, upload/download files, list files, and collect sensitive data.

“Originally developed by Zhao Jibin (aka WHG), this backdoor has evolved throughout time in various variants” — Sekoya said at the beginning of April this year. “The PlugX builder has been split between several intrusion kits, most of which have been attributed to shell companies linked to China’s Ministry of State Security.”

PlugX malware

Over the years, this has also happened incorporated worm component that allows it to spread through infected USB driveseffectively bypassing air-gapped networks.

Sekoia, which developed the PlugX removal solution, said variants of the malware with a USB distribution mechanism come with a self-delete command (“0x1005”) to remove itself from compromised workstations, although there is currently no way to remove it from the USB device itself .

“First, the worm has the ability to exist in air-gapped networks, making these infections beyond our reach,” it said. “Second, and perhaps even more noteworthy, the PlugX worm can reside on infected USB devices for extended periods of time without being connected to a workstation.”

Given the legal complexities involved in remotely removing malware from systems, the company also said it was deferring the decision to national computer emergency response teams (CERTs), law enforcement agencies (LEAs) and cybersecurity agencies.

“Following the report from Sekoia.io, the French judicial authorities launched a disinfection operation to dismantle the botnet controlled by the PlugX worm. PlugX affected several million victims worldwide,” Sekoia told The Hacker News. “The disinfection solution developed by the Sekoia.io TDR team has been offered through Europol to partner countries and is currently being rolled out.”

“We are happy to cooperate fruitfully with the actors involved in France (Department J3 of the Paris Prosecutor’s Office, the police, the gendarmerie and ANSSI) and internationally (Europol and police forces of third countries) to take action against the ongoing malicious cyber. activity”.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.