Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Hazy Hawk exploits DNS Records in CDC CDC, Corporate Domains for Delivery Programs

May 20, 2025

100+ fake expansion of chromed found sessions, theft of credentials, injection ads

May 20, 2025

AWS default Iam roles that allow you to enable side motion and cross -service operation

May 20, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Winnti Apt41 aimed at Japanese firms in Revivalstone Cyber ​​Spyonage
Global Security

Winnti Apt41 aimed at Japanese firms in Revivalstone Cyber ​​Spyonage

AdminBy AdminFebruary 18, 2025No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


February 18, 2025Red LakshmananMalicious software / network safety

Chinese actor threats known as Winnti was attributed to a new company named Revivalsstone This is aimed at Japanese companies in the production, materials and energy sectors in March 2024.

Activity minute The Japanese Cybersecurity Company crosses with the threat cluster, tracked by Trend Micro as The land of Freibugwhich was evaluated by the subsidiary within the cyber -Spying APT41 Cuckoo operationand Symantec like Blackfly.

APT41 It was described as a highly qualified and methodical actor with the ability to strengthen the espionage attacks, as well as poison the supply chain. His companies are often designed with the stealth, using the tactics to achieve its goals, using a custom set of tools that not only bypass the safety software installed in the environment, but also harvests important information and sets secret channels for permanent remote access.

Cybersecurity

“Spying activity of the group, many of which are in line with the strategic goals of the country, have directed a wide range of public and private sectors around the world,” Lac said.

“The attacks of this threat group are characterized by the use of malicious Winnti software, which has a unique rootkit that allows you to hide and manipulate communications, and use stolen, legitimate digital certificates in the malicious program.”

Winnti, active with at least 2012, primarily nominated production and material organizations in Asia as of 2022, with The latest companies Between November 2023 and October 2024, aimed at the Asia-Pacific Region (APAC), using weaknesses in additions to the public as IBM Lotus Domino, to deploy malicious programs as follows

  • Deathlotus – Passive rear of CGI that supports the creation of files and execution of commands
  • Unpaid – Utility of evading protection written in C ++
  • Privilege – a loader used to give up the Winnti rats (he’s Depdloglog(
  • Cunningpigeon – The back of the Microsoft Graph API for receiving commands – file management and processes, as well as custom proxes – from postal posts
  • Windjammer – Rootkit with the TCPIP network interface capabilities as well as creating secret channels with infected end points in intranet
  • Shadowgaze – Passive rear rear part of re -use Port listening with web server IIS

The latest attacked LAC has been found to collect your exploration, collect your lateral movement and ensure the enhanced Warm Software version.

It is said that the invasion achievement was extended further to violate the managed service provider (MSP) using a common account with subsequent armed weapons of the company to distribute malicious software to three other organizations.

Laka said she also found links to TRADE -Kamen and Stonev5 in Revivalstone, the former is a controller that is designed to work with malicious Winnti software and which was also inclusive in I-Sun (aka ondarun) leak of Last year Due to the Linux malware control panel.

Cybersecurity

“If Treadstone has the same value as Winnti malicious software, it is only assumptions, but Stonev5 may also mean version 5, and it is possible that the malicious software used in this attack.

“The new Winnti malicious software has been implemented with functions such as blocked, updated encryption algorithms and evading safety products, and it is likely that this group of attackers will continue to update the malicious Winnti software and use it in the attacks.”

Disclosure is happening when the Fortinet Fortiguard lab minute Linux Attack -based set, dubbed sshdinjector, which is equipped to kidnap Daemon SSH on network instruments, entering malicious software into the permanent access process and hidden actions since November 2024.

A set of malicious programs associated with another Chinese hacker group known as Creeks (AKA Bronze Highland and Elevative Panda) is designed to exploit data, listening to instructions coming from a remote server to list processes and services, execute files, launch the terminal and execute terminal commands.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Hazy Hawk exploits DNS Records in CDC CDC, Corporate Domains for Delivery Programs

May 20, 2025

100+ fake expansion of chromed found sessions, theft of credentials, injection ads

May 20, 2025

AWS default Iam roles that allow you to enable side motion and cross -service operation

May 20, 2025

South Asia ministries affected by SIDGE APT using old office deficiencies and custom malicious programs

May 20, 2025

Basic ideas from the 2025 state report

May 20, 2025

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Hazy Hawk exploits DNS Records in CDC CDC, Corporate Domains for Delivery Programs

May 20, 2025

100+ fake expansion of chromed found sessions, theft of credentials, injection ads

May 20, 2025

AWS default Iam roles that allow you to enable side motion and cross -service operation

May 20, 2025

South Asia ministries affected by SIDGE APT using old office deficiencies and custom malicious programs

May 20, 2025

Basic ideas from the 2025 state report

May 20, 2025

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025

Based on GO based on malicious programs deployed Xmrig Miner on hosts Linux through Redis configuration abuse

May 20, 2025

Malicious Pypi Packages Operating Instagram and Tiktok API to verify users’ accounts

May 20, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Hazy Hawk exploits DNS Records in CDC CDC, Corporate Domains for Delivery Programs

May 20, 2025

100+ fake expansion of chromed found sessions, theft of credentials, injection ads

May 20, 2025

AWS default Iam roles that allow you to enable side motion and cross -service operation

May 20, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.