Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Chinese Apt Lotus Panda focuses on governments with new Backdoor Sagerunex options
Global Security

Chinese Apt Lotus Panda focuses on governments with new Backdoor Sagerunex options

AdminBy AdminMarch 5, 2025No Comments3 Mins Read
Chinese APT Lotus Panda
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


05 March 2025Red LakshmananCyber ​​-bue / network security

Chinese apt lotus panda

Actor threats known as Lotus panda It is observed in the field of government, production, telecommunications and media sectors in the Philippines, Vietnam, Hong Kong and Taiwan with updated versions of the famous back day called SAGERUNEX.

“Lotus Blossom uses Backdoor Sagerunex at least since 2016 and is increasingly using long -term shells and develops new SAGERUNEX malware,” Cisco Talos Joey Chen researcher – Note in an analysis published last week.

Lotus Panda, also known as Billbug, bronze Elgin, lotus Blasom, Spring -Tsmok and Trip, is a suspect of a Chinese hacking crew that has been in force since 2009. For the first time exposed From Symantec in June 2018.

Cybersecurity

At the end of 2022 Symantec owned by Broadcom minute Attack of the actor threat to the digital certificate, as well as state and defense agencies, located in different countries of Asia, which provided the use of hind premises such as Hannotog and Sagerunex.

The exact initial access vector used to violate business entities in the last select set is unknown, although it has a story-fitting and glazed holes. The indefinite attack path serves as a Sagerunex implant, which is evaluated as the evolution of the old malicious Billbug, known as EVO.

The activity deserves attention to the use of two new “beta” options that use legal services such as Dropbox, X and Zimbra as command and control (C2) to avoid detection. They were so-called because of the presence of lines debugging in the source code.

Chinese apt lotus panda

Backdoor is designed to collect target information about the host, encrypt it and the expressions of the details on the remote server under the control of the attacker. It is believed that Dropbox and X versions of Sagerunex were used between 2018 and 2022, while the Zimbra version is said to have existed since 2019.

“The Zimbra WebMail Sagerunex version is designed not only to collect the victims and send to Zimbra mailbox, but also allow the actor to use the Zimbra mail content to provide orders and driving the victim’s machine,” Chen said.

“If the mailbox has a legitimate command content of the commands, Backdoor downloads the content and receives a command, otherwise Backdoor will remove the content and waiting for a legitimate team.”

The results of the execution of the team are further packed in the form of the RAR archive and attached to the e -mail project in the mailbox and garbage folder project.

Cybersecurity

Also deployed in attacks, these are other tools such as the theft of cookies for collecting credentials about browser Chrome, called open source proxy JanodProgram adjusts and order software to compress and encrypt the captured data.

In addition, the actor threats are observed by teams such as Net, Tacklist, IPConfig and Netstat to perform the target environment’s exploration, except for checking the Internet access.

“If Internet access is limited, the actor has two strategies: the use of proxy settings to install a connection or use of the Venom Proxy tool to connect insulated machines with available online systems,” the talos said.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.