• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Hackers Hide Malware in Windows Logo, Target Middle East Governments

You are here: Home / General Cyber Security News / Hackers Hide Malware in Windows Logo, Target Middle East Governments
September 30, 2022

A hacking group dubbed ‘Witchetty’ has been observed applying a steganographic technique to disguise a backdoor in a Windows logo and goal Middle Eastern governments.

In accordance to a new advisory by Broadcom, Witchetty (aka LookingFrog) is considered to have connections to the state–backed Chinese menace actor APT10 as properly as with TA410 operatives, a group formerly joined to attacks versus US electricity vendors.

Witchetty was first identified by ESET in April 2022, with its action becoming characterized by the use of a first–stage backdoor acknowledged as X4 and a second–stage payload recognised as LookBack.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


While the group has ongoing to use the LookBack backdoor, Broadcom observed that many new varieties of malware show up to have been added to its toolset.

“The Witchetty espionage group […] has been progressively updating its toolset, employing new malware in attacks on targets in the Center East and Africa,” the advisory reads.

“Between the new equipment remaining employed by the group is a backdoor Trojan (Backdoor.Stegmap) that employs steganography, a seldom seen technique the place destructive code is hidden within just an picture.”

Further, the attackers observed by Broadcom amongst February and September 2022 exploited ProxyShell and ProxyLogon vulnerabilities to put in web shells on public–facing servers. It then stole qualifications, moved laterally throughout networks and set up malware on other personal computers.

“Witchetty has shown the potential to regularly refine and refresh its toolset in get to compromise targets of interest,” Broadcom wrote.

“Exploitation of vulnerabilities on public–facing servers offers it with a route into corporations, whilst custom applications paired with adept use of living–off–the–land techniques let it to manage a long–term, persistent existence in qualified organizations.”

Symantec has furnished protection updates about the most up-to-date Witchetty attacks in its Protection Bulletin.

The publication of the advisory will come months after CloudSEK scientists found an considerable phishing marketing campaign in which risk actors were impersonating the Ministry of Human Assets of the UAE governing administration.


Some pieces of this post are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Hackers Backdoor Pirated Windows OS With Cryptominer and Xtreme RAT
Next Post: CISA Warns of Hackers Exploiting Critical Atlassian Bitbucket Server Vulnerability cisa warns of hackers exploiting critical atlassian bitbucket server vulnerability»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.