Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

APT10 Targets Windows With Advanced Malware

July 31, 2024
Reading Time: 3 mins read
in Alerts
APT10 Targets Windows With Advanced Malware

Researchers have recently uncovered Cuckoo Spear, an advanced threat actor associated with the renowned APT10 group. This sophisticated adversary has demonstrated persistent and stealthy operations within victim networks, maintaining a presence for two to three years. The discovery highlights the growing complexity of cyber espionage tactics and underscores the critical need for robust security protocols and continuous threat monitoring. Cuckoo Spear employs novel techniques and tools to execute its operations, emphasizing the importance of collaborative intelligence sharing among organizations and governments to counter such sophisticated nation-state adversaries.

Since December 2019, the LODEINFO malware, attributed to APT10, has been actively targeting critical infrastructure and academic sectors. Recent investigations have linked LODEINFO to a newly identified malware variant, NOOPDOOR, which, together with LODEINFO, forms the “Cuckoo Spear” threat suite. This combination of malware is used for persistent network infiltration and data exfiltration, indicating that espionage remains the primary motive behind these operations. The dual use of LODEINFO and NOOPDOOR showcases a strategic approach to maintaining long-term covert access within compromised networks.

The NOOPDOOR malware is a sophisticated 64-bit modular backdoor that utilizes domain-generation algorithm (DGA)-based command-and-control (C2) communication. It is loaded by the NOOPLDR decryptor, which is part of a multi-stage attack strategy. The use of NOOPDOOR for long-term covert operations, coupled with LODEINFO serving as the initial infection vector and command-and-control channel, illustrates the advanced nature of these threat actors’ tactics. The malware’s modular architecture and sophisticated functionalities, such as decryption mechanisms and DGA-based C2, highlight the evolving arsenal and techniques employed by Cuckoo Spear.

Cybereason’s research team, including Jin Ito, Loic Castel, and Kotaro Ogino, has provided an in-depth analysis of the NOOPDOOR and NOOPLDR malware variants. Their report reveals that Cuckoo Spear’s threat actors primarily use spear phishing through LODEINFO for initial access. They employ methods such as abusing Scheduled Tasks and WMI Consumer Events to ensure persistence within compromised systems. Techniques like leveraging MSBuild to compile malicious XML files and exploiting WMI event consumers for ActiveScript execution underscore the adversaries’ adaptability and resourcefulness. This advanced threat landscape necessitates heightened vigilance and adaptive defenses to mitigate the risks posed by such sophisticated cyber espionage activities.

Reference:

  • Researchers Uncover Advanced Cuckoo Spear Threat Actor Targeting Windows Users
Tags: APT10Cuckoo SpearCyber AlertsCyber Alerts 2024Cyber RiskCyber threatsJuly 2024LODEINFONOOPDOOR
ADVERTISEMENT

Related Posts

New Godfather Trojan Hijacks Banking Apps

Winos 4.0 Malware Hits Taiwan Via Tax Phish

June 20, 2025
New Godfather Trojan Hijacks Banking Apps

New Godfather Trojan Hijacks Banking Apps

June 20, 2025
New Godfather Trojan Hijacks Banking Apps

New Amatera Stealer Delivered By ClearFake

June 20, 2025
Fake Invoices Deliver Sorillus RAT In Europe

Fake Minecraft Mods On GitHub Spread Malware

June 19, 2025
Russian Phishing Scam Bypasses Google 2FA

Russian Phishing Scam Bypasses Google 2FA

June 19, 2025
Fake Invoices Deliver Sorillus RAT In Europe

Fake Invoices Deliver Sorillus RAT In Europe

June 19, 2025

Latest Alerts

Winos 4.0 Malware Hits Taiwan Via Tax Phish

New Amatera Stealer Delivered By ClearFake

New Godfather Trojan Hijacks Banking Apps

Fake Minecraft Mods On GitHub Spread Malware

Fake Invoices Deliver Sorillus RAT In Europe

Russian Phishing Scam Bypasses Google 2FA

Subscribe to our newsletter

    Latest Incidents

    Massive Leak Exposes 16 Billion Credentials

    Tonga Health System Down After Ransomware

    Chinese Spies Target Satellite Giant Viasat

    German Dealer Leymann Hacked Closes Stores

    Hacker Mints $27M From Meta Pool Gets 132K

    UBS and Pictet Hit By Vendor Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial