Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Earth Minotaur Unveils New Malware Arsenal

December 5, 2024
Reading Time: 2 mins read
in Alerts
Earth Minotaur Unveils New Malware Arsenal

Trend Micro researchers have revealed a sophisticated cyber campaign by the threat actor Earth Minotaur, leveraging the MOONSHINE exploit kit and DarkNimbus backdoor to target vulnerabilities in Android messaging apps. These attacks, primarily aimed at Tibetan and Uyghur communities, exploit Chromium-based browsers embedded in instant messaging applications. By deploying MOONSHINE, Earth Minotaur delivers the cross-platform DarkNimbus backdoor to both Android and Windows devices, enabling surveillance and unauthorized access.

MOONSHINE, first identified in 2019, has evolved into a more advanced exploit kit with enhanced capabilities. Its upgraded version now includes features to deter analysis, such as link validation through timestamps and salted hashes, and the ability to redirect victims to legitimate sites after exploitation. These measures ensure the attacks remain undetected by victims and security researchers. To date, Trend Micro has identified over 55 active MOONSHINE servers, highlighting the scale and persistence of this threat.

Earth Minotaur employs social engineering to lure victims into clicking malicious links embedded in seemingly legitimate content. These links, often disguised as government announcements or cultural videos, lead victims to MOONSHINE exploit kit servers. The servers exploit vulnerabilities in Chromium-based browsers, particularly when applications fail to update or lack sandboxing protections. Once compromised, victims’ devices are infected with the DarkNimbus backdoor, granting attackers remote control and access to sensitive information.

This discovery underscores the critical importance of regular software updates and enabling advanced security features like sandboxing in applications. The cross-platform nature of DarkNimbus further amplifies the potential impact of these attacks. As Earth Minotaur continues to refine its tactics, the cybersecurity community must remain vigilant, with increased awareness and proactive measures essential to countering threats posed by the MOONSHINE exploit kit and similar advanced tools.

Reference:

  • Earth Minotaur Uses MOONSHINE and DarkNimbus for Multi-Platform Attacks
Tags: AndroidCyber AlertsCyber Alerts 2024Cyber threatsDarkNimbusDecember 2024Earth MinotaurMOONSHINETibetTrend MicroUyghurVulnerabilitiesWindows
ADVERTISEMENT

Related Posts

Gootloader Returns With New Tricks

Malicious VS Code Extension Found

November 7, 2025
Gootloader Returns With New Tricks

CISA Warns Of CentOS Panel Exploit

November 7, 2025
Gootloader Returns With New Tricks

Gootloader Returns With New Tricks

November 7, 2025
Russia Group Exploits Windows HyperV

Russia Group Exploits Windows HyperV

November 6, 2025
Russia Group Exploits Windows HyperV

SkyCloak Backdoor Targets Defense Firms

November 6, 2025
Russia Group Exploits Windows HyperV

Teams Bugs Let Hackers Impersonate

November 6, 2025

Latest Alerts

Malicious VS Code Extension Found

CISA Warns Of CentOS Panel Exploit

Gootloader Returns With New Tricks

Russia Group Exploits Windows HyperV

SkyCloak Backdoor Targets Defense Firms

Teams Bugs Let Hackers Impersonate

Subscribe to our newsletter

    Latest Incidents

    US Budget Office Hit By Cyberattack

    Hyundai AutoEver Reports Data Breach

    Clop Claims Washington Post Breach

    Hackers Steal Data From Swiss Bank

    Belgian Telecoms Hit By Cyberattack

    Sandworm Wipers Hit Ukraines Grain Hub

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial