• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
apt hackers targeting industrial control systems with shadowpad backdoor

APT Hackers Targeting Industrial Control Systems with ShadowPad Backdoor

You are here: Home / General Cyber Security News / APT Hackers Targeting Industrial Control Systems with ShadowPad Backdoor
June 28, 2022

Entities located in Afghanistan, Malaysia, and Pakistan are in the crosshairs of an attack marketing campaign that targets unpatched Microsoft Trade Servers as an first obtain vector to deploy the ShadowPad malware.

Russian cybersecurity company Kaspersky, which first detected the action in mid-October 2021, attributed it to a earlier unknown Chinese-talking menace actor. Targets include things like companies in the telecommunications, manufacturing, and transportation sectors.

“For the duration of the original attacks, the group exploited an MS Exchange vulnerability to deploy ShadowPad malware and infiltrated making automation units of just one of the victims,” the organization mentioned. “By having regulate over all those methods, the attacker can arrive at other, even a lot more delicate methods of the attacked firm.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


ShadowPad, which emerged in 2015 as the successor to PlugX, is a privately sold modular malware platform that has been set to use by numerous Chinese espionage actors in excess of the years.

Though its style and design enables customers to remotely deploy more plugins that can prolong its features beyond covert knowledge selection, what makes ShadowPad hazardous is the anti-forensic and anti-investigation system incorporated into the malware.

“Throughout the attacks of the noticed actor, the ShadowPad backdoor was downloaded onto the attacked personal computers beneath the guise of legitimate software program,” Kaspersky said. “In quite a few instances, the attacking team exploited a recognised vulnerability in MS Exchange, and entered the commands manually, indicating the remarkably qualified character of their strategies.”

CyberSecurity

Proof implies that intrusions mounted by the adversary started in March 2021, correct all-around the time the ProxyLogon vulnerabilities in Exchange Servers grew to become community awareness. Some of the targets are reported to have been breached by exploiting CVE-2021-26855, a server-aspect request forgery (SSRF) vulnerability in the mail server.

Aside from deploying ShadowPad as “mscoree.dll,” an genuine Microsoft .NET Framework element, the attacks also concerned the use of Cobalt Strike, a PlugX variant called THOR, and web shells for remote entry.

While the closing ambitions of the marketing campaign keep on being unknown, the attackers are thought to be interested in very long-expression intelligence collecting.

“Setting up automation methods are unusual targets for state-of-the-art threat actors,” Kaspersky ICS CERT researcher Kirill Kruglov explained. “Nevertheless, those people techniques can be a worthwhile resource of highly private information and may deliver the attackers with a backdoor to other, extra secured, spots of infrastructures.”

Discovered this write-up interesting? Comply with THN on Facebook, Twitter  and LinkedIn to read a lot more exclusive information we submit.


Some sections of this write-up are sourced from:
thehackernews.com

Previous Post: «Cyber Security News 97% Of UK Business Leaders Expect Quantum Computing to Disrupt Their Sectors
Next Post: Log4Shell Vulnerability Targeted in VMware Servers to Exfiltrate Data log4shell vulnerability targeted in vmware servers to exfiltrate data»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.