Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

China Linked Tick Exploits Lanscope

November 4, 2025
Reading Time: 3 mins read
in Alerts
China Linked Tick Exploits Lanscope

A sophisticated cyber espionage group known as Tick, which also goes by aliases like Bronze Butler and Swirl Typhoon, has been observed actively exploiting a recently disclosed, critical security flaw in the Motex Lanscope Endpoint Manager. This vulnerability, tracked as CVE-2025-61932 and boasting a CVSS score of 9.3, allows remote attackers to execute arbitrary commands with SYSTEM privileges on on-premise versions of the software. An alert from JPCERT/CC confirmed reports of this active abuse, stating that the security defect is being used to deploy a backdoor onto compromised systems. This group is widely assessed to be a Chinese state-sponsored actor that has been active since at least 2006, with a pronounced and consistent focus on targets in East Asia, particularly Japan.

The campaign, which was monitored by Sophos, leveraged the exploitation of CVE-2025-61932 to install a known piece of malware called Gokcpdoor. This backdoor is designed to establish a proxy connection with a remote server, functioning as a persistent access point for executing malicious commands on the infected host. Researchers noted a 2025 variant of Gokcpdoor that removed support for the KCP protocol and instead implemented multiplexing communication via a third-party library, smux, for its command-and-control (C2) communication. Sophos detected two distinct versions of the malware serving different roles: a server type to listen for remote access connections, and a client type that initiates connections to hard-coded C2 servers to create a covert channel.

In addition to the custom backdoor, the attack chain is characterized by the deployment of the Havoc post-exploitation framework on specific systems. The infection process relies heavily on DLL side-loading, where a component called OAED Loader is used to inject the subsequent malicious payloads. The threat actors utilized several other common tools to facilitate their objectives, including goddi for dumping Active Directory information, Remote Desktop for remote access through their established backdoor tunnels, and the archival utility 7-Zip. Furthermore, the group was observed accessing public cloud services like io, LimeWire, and Piping Server via the web browser during their remote desktop sessions, indicating a method they use to exfiltrate the stolen data.

A director of threat intelligence at Sophos CTU commented on the incident, confirming their awareness of the highly targeted activity in Japan. They expressed a belief that the initial exploitation by Bronze Butler was limited to sectors that align with their intelligence objectives. However, they cautioned that because the vulnerability has now been publicly disclosed, a broader range of other threat actors are likely to attempt to exploit the flaw.

This is not the first instance where the Tick cyber espionage group has been caught leveraging a zero-day vulnerability in their operations. In a comparable incident from October 2017, the group was documented exploiting a previously unpatched remote code execution vulnerability (CVE-2016-7836) in SKYSEA Client View, another Japanese IT asset management software, to compromise machines and steal sensitive data. Given the ongoing nature of these attacks, Sophos strongly recommends that organizations immediately upgrade their vulnerable Lanscope servers and review any internet-facing Lanscope servers with the client or agent program installed to determine if public exposure is strictly necessary for business operations.

Reference:

  • China Linked Tick Group Exploits Lanscope Zero Day To Hijack Corporate Systems
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityNovember 2025
ADVERTISEMENT

Related Posts

ShadowPad Exploits WSUS Flaw For Access

Windows 11 24H2 Explorer And Start Crash

November 24, 2025
ShadowPad Exploits WSUS Flaw For Access

Matrix Push C2 Uses Browser Alerts To Phish

November 24, 2025
ShadowPad Exploits WSUS Flaw For Access

ShadowPad Exploits WSUS Flaw For Access

November 24, 2025
Salesforce Breach Hits Over 200 Victims

Sturnus Trojan Steals Android Chats

November 21, 2025
Salesforce Breach Hits Over 200 Victims

Tsundere Botnet Grows via Game Lures

November 21, 2025
APT24 Uses BADAUDIO in Taiwan Spying

APT24 Uses BADAUDIO in Taiwan Spying

November 21, 2025

Latest Alerts

Windows 11 24H2 Explorer And Start Crash

Matrix Push C2 Uses Browser Alerts To Phish

ShadowPad Exploits WSUS Flaw For Access

Sturnus Trojan Steals Android Chats

Tsundere Botnet Grows via Game Lures

APT24 Uses BADAUDIO in Taiwan Spying

Subscribe to our newsletter

    Latest Incidents

    Delta Dental Virginia Breach Hits 146000

    Iberia Alerts Customers To Data Breach

    Cox Confirms Oracle Hack As Victims Named

    Over 50000 Asus Routers Compromised

    Salesforce Breach Hits Over 200 Victims

    Almaviva Leak Exposes FS Group Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial