Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » New cross-platform KTLVdoor malware discovered in attack on Chinese trading firm
Global Security

New cross-platform KTLVdoor malware discovered in attack on Chinese trading firm

AdminBy AdminSeptember 5, 2024No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


September 5, 2024Ravi LakshmananCyber ​​attack / malware

A Chinese-language threat actor known as Earth Lusca has been spotted using a new backdoor called KTLVdoor as part of a cyber attack targeting an unnamed trading company in China.

The previously unreported malware is written in the Golang language and is therefore a cross-platform weapon capable of targeting both Microsoft Windows and Linux systems.

“KTLVdoor is a highly obfuscated malware that masquerades as various system utilities, allowing attackers to perform a variety of tasks including file manipulation, command execution, and remote port scanning,” Trend Micro researchers Cedric Pernet and Jaromir Khareisi said in an analysis published Wednesday.

Cyber ​​security

Some of the tools that KTLVdoor impersonates include sshd, Java, SQLite, bash, and edr-agent, among others, with malware distributed in the form of a dynamic link library (.dll) or shared object (.so).

Perhaps the most unusual aspect of the cluster of activity is the discovery of more than 50 command and control (C&C) servers, all hosted by the Chinese company Alibaba, which have been identified as communicating with variants of the malware, raising the possibility that the infrastructure may be shared with by other Chinese threat actors.

The land of Lusk is there of course be active from at least 2021, orchestrating cyber attacks against public and private sector organizations in Asia, Australia, Europe and North America. It is believed to share some tactical similarities with other invasion sets tracked as RedHotel and APT27 (aka Budworm, Emissary Panda and Iron tiger).

KTLVdoor, the latest addition to the group’s malware arsenal, is highly obfuscated and gets its name from the use of a token called “KTLV” in a configuration file that includes various parameters required to perform its functions, including C&C servers to connect to.

Cyber ​​security

Once initialized, the malware initiates contact with the C&C server in a loop, waiting for further instructions to be executed on the compromised host. Supported commands allow you to download/upload files, list the file system, run an interactive shell, run shellcode, and initiate scans using ScanTCP, ScanRDP, DialTLS, ScanPing, and ScanWeb, among others.

However, little is known about how the malware is distributed or whether it has been used to attack other organizations around the world.

“This new tool is used by Earth Lusca, but it can also be shared by other Chinese-speaking threat actors,” the researchers noted. “Seeing that the C&C servers were all on the IP addresses of Chinese supplier Alibaba, we wonder if the whole appearance of this new malware and C&C server could be some kind of early stage testing of new tools.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025

How to Decide Safety Expanding

June 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025

How to Decide Safety Expanding

June 12, 2025

The new tokenbreak attack combines AI moderation with a one -sided character change

June 12, 2025

AI AI agents work on secret accounts – learn how to fasten them in this webinar

June 12, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.