Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » ANEL and NOOPDOOR backdoors armed in MirrorFace’s new campaign against Japan
Global Security

ANEL and NOOPDOOR backdoors armed in MirrorFace’s new campaign against Japan

AdminBy AdminDecember 5, 2024No Comments3 Mins Read
ANEL and NOOPDOOR Backdoors
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


December 5, 2024Ravi LakshmananCyber ​​espionage / malware

ANEL and NOOPDOOR backdoors

The China-linked threat known as MirrorFace has been attributed to a new phishing campaign since June 2024, mainly targeting individuals and organizations in Japan.

The purpose of the campaign is to spread backdoors known as NOOPDOOR (aka HiddenFace) and SORRY (aka UPPERCOTT), Trend Micro’s technical analysis says.

“An interesting aspect of this campaign is the return of a backdoor called ANEL that was used in campaigns targeting Japan APT10 until around 2018 and has not been observed since then,” said security researcher Hara Hiroaki said.

It should be noted that MirrorFace also used ANEL documented ESET last month in a cyber attack targeting a diplomatic organization in the European Union using lures related to the World Expo.

Cyber ​​security

MirrorFace, also known as Earth Kasha, is the name given to a Chinese threat actor known for persistent attacks against Japanese organizations. This is estimated to be a subcluster in APT10.

The latest campaign is a departure from the hacker group’s incursions seen in 2023, which primarily sought exploit security flaws in edge devices from Array Networks and Fortinet for initial access.

According to Trend Micro, the shift to phishing emails is deliberate, and the decision is motivated by the fact that the attacks are designed to target individuals, not businesses.

“Furthermore, an analysis of victim profiles and names of the distributed lures shows that the adversaries are particularly interested in topics related to Japan’s national security and international relations,” Hiroaki noted.

ANEL and NOOPDOOR backdoors

Digital messages sent from free email accounts or from compromised accounts contain a link to Microsoft OneDrive. They seek to lure recipients into downloading the mined ZIP archive using topics related to interview requests and Japan’s economic security in light of current US-China relations.

Trend Micro said the contents of the ZIP archive varied by target, adding that it had identified three different infection vectors used to deliver a malicious dropper called ROAMINGMOUSE –

  • A Word document with macro support
  • A Windows shortcut file that runs a self-extracting archive (SFX) that then loads a macro-enabled document template
  • The Windows shortcut file that launches PowerShell is responsible for removing the built-in cabinet archive, which then loads a macro-enabled document template

The macro-enabled document, ROAMINGMOUSE, acts as a dropper for ANEL-related components and eventually launches the backdoor while incorporating evasion techniques that hide it from security programs and make detection difficult.

Cyber ​​security

One of the modules deployed via the dropper is ANELLDR, a loader that is designed to run ANEL in memory. It is launched using a well-known method called DLL sideloading, after which it decrypts and executes the backdoor in the final stage.

A 32-bit HTTP-based implant, ANEL actively developed between 2017 and 2018 as a way to take screenshots, upload/download files, load executables, and run commands via cmd.exe. The 2024 campaign uses an updated version that introduces a new command to run a specific program with elevated privileges.

In addition, attack chains use the backdoor to gather information from infected environments and selectively deploy NOOPDOOR against targets of particular interest.

“Many of the targets are individuals, such as researchers, who may have different security measures compared to corporate organizations, making these attacks more difficult to detect,” Hiroaki said. “It is important to take basic countermeasures, such as avoiding opening files attached to suspicious emails.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.