κατασκευή ιστοσελίδων ρόδος

TECH - WEB DEVELOPMENT NEWS

Get the latest tech - web development news and analysis on industry around the world.

  • HOME
You are here: Home / INDUSTRY NEWS / New Charon Ransomware Employs DLL Sideloading, and Anti-EDR Capabilities to Attack Organizations
άμυνα
.

New Charon Ransomware Employs DLL Sideloading, and Anti-EDR Capabilities to Attack Organizations

13/08/2025

A sophisticated new ransomware family called Charon has emerged in the cybersecurity landscape, targeting organizations in the Middle East’s public sector and aviation industry with advanced persistent threat (APT) techniques typically reserved for nation-state actors.

The ransomware campaign represents a concerning evolution in cybercriminal operations, combining stealth, precision, and destructive capabilities to maximize impact on victim organizations.

The threat actors behind Charon demonstrate remarkable technical sophistication by employing DLL sideloading techniques that closely mirror tactics previously documented in Earth Baxia campaigns, which have historically focused on government sectors.

The attack chain begins with the execution of a legitimate Edge.exe binary, originally named cookie_exporter.exe, which is then abused to sideload a malicious Dynamic Link Library (DLL) file named msedge.dll, internally designated as “SWORDLDR.”

Trend Micro researchers identified this campaign through forensic investigation after initially missing a critical component called DumpStack.log in their telemetry.

Upon recovery and analysis of this file, they discovered it contained encrypted shellcode that, when decrypted, revealed the Charon ransomware payload.

The ransomware’s custom ransom note specifically references victim organizations by name, confirming this as a targeted operation rather than an opportunistic attack.

Charon’s customized ransom note (Source – Trend Micro)

The malware’s deployment strategy involves a sophisticated multistage payload extraction technique. The SWORDLDR component loads the seemingly benign DumpStack.log file, which actually contains multiple layers of encrypted shellcode.

After decryption of the first layer, an intermediate payload emerges with embedded configuration data specifically indicating the use of svchost.exe for process injection, as shown in the recovered code structure.

Advanced Evasion and Encryption Mechanisms

Charon’s technical architecture reveals several advanced capabilities designed to evade detection and maximize encryption efficiency.

The ransomware creates a mutex named “OopsCharonHere” to prevent multiple instances from running simultaneously.

Execution flow of the Charon ransomware attack (Source – Trend Micro)

Before initiating encryption, it systematically disables security-related services and terminates active processes, including antivirus and endpoint protection software.

The malware employs a hybrid cryptographic scheme combining Curve25519 elliptic curve cryptography with the ChaCha20 stream cipher.

It generates a 32-byte random private key using Windows’ cryptographic functions, then creates a public key combined with a hardcoded public key embedded in the binary to establish a shared secret.

This sophisticated encryption approach includes partial file encryption strategies based on file size, with smaller files receiving full encryption while larger files have strategic chunks encrypted at specific positions.

Perhaps most concerning is Charon’s inclusion of anti-EDR capabilities derived from the public Dark-Kill project.

The ransomware attempts to drop a driver as WWC.sys and register it as the “WWC” service, though analysis revealed this component remains dormant in current variants, suggesting ongoing development for future versions.

Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.
Source: cybersecuritynews.com

Filed Under: INDUSTRY NEWS Tagged With: Source-10

Our favorite third-party Windows customization tool now lets you clean your storage better

If you want to take control over Windows' features, you could do a lot worse than giving Wintoys a try. It's a cool little third-party suite of stuff you can check out, and we recently named it something everyone should be using. Source: xda-developers.com … [Read More...]

One of the best ways to evade Windows 11's system requirements now lets you control when Windows updates

Windows 10's end-of-life date is fast approaching, and in response, the apps designed to help people transition to Windows 11 are undergoing a flurry of updates to handle the expected influx of users better. Currently, two apps help users bypass Windows 11's system requirements: Rufus (which recently received a dark mode update) and Flyoobe (formerly Flyby11). Source: xda-developers.com … [Read More...]

Heidi Health raises $65M Series B led by Steve Cohen’s Point72

Dr. Tom Kelly is a trauma surgeon, and everywhere, he sees doctors drowning in administrative work. He wanted change, so he set out to build it.  “We wanted to build an AI care partner that would stand alongside clinicians and take care of the admin so that individual providers, like me, can feel empowered to deliver the care which we dedicated our lives to,” he told … [Read More...]

OnePlus 15 to Reportedly Carry the Largest Battery on a OnePlus Smartphone

OnePlus 15 launch appears to be around the corner, after the company confirmed that the smartphone will make its debut in China in October. Meanwhile, a new report claims that the OnePlus 13 successor will be backed by the largest battery ever seen on a OnePlus smartphone. Alongside, it is also expected to support wireless charging. The new details arrive just days after a tipster claimed that the … [Read More...]

3 reasons why Perplexity’s Comet has become my go-to browser

There’s no shortage of browsers nowadays, and a new one seems to pop up every few days. And though some of the browsers that launch quietly fade away and are eventually forgotten, every so often one comes along that manages to take over the internet. Source: xda-developers.com … [Read More...]

3 signs that you need a new CPU instead of a GPU

When you experience lower average frame rates or FPS drops, it's easy to assume that your graphics card is the culprit. After all, it's the main component that drives the visuals while you're gaming. However, the issue is that your GPU isn't always the primary cause of all your FPS issues. Although it does most of the heavy lifting in graphically demanding workloads, your CPU plays an equally … [Read More...]

The 3 PlayStation Plus games announced at State of Play you have to download to your PS5

PlayStation has been building up the catalog of classics and new titles available to players through the PlayStation Plus game catalog. With the September 2025 State of Play presentation, that catalog of titles for PS5 owners is continuing to get larger, offering a variety of games to play on the console. Unlike previous showings of State of Play, some highly requested and classic games are making … [Read More...]

5 productivity apps that made my NAS more useful than Google Workspace

Google Workspace is the industry default productivity suite, and rightly so — it’s fast, reliable, has excellent integrations, and offers handy collaboration features. However, it is just another subscription added to your credit card, which starts to bother you, especially if your team size is growing. Source: xda-developers.com … [Read More...]

6 tiny self-hosting tools that save me hours every week

If you are like me, you love the idea of self-hosting, but hate the thought of endless configuration and maintenance. The truth is, self-hosting doesn’t have to be a major time sink – it can actually be a massive time saver. I have spent months testing and refining my setup, and in the process, I have found tiny set-it-and-forget-it tools that work tirelessly in the background. Source: … [Read More...]

4 video game franchises that have lost their identity

Every successful game franchise has something that makes it unique: a style, a story, or a gameplay mechanic that players fall in love with. But when a series strays too far from its roots, that identity starts to fade. Here are four big franchises that lost touch with what made them special. Source: xda-developers.com … [Read More...]

Tags

Source-1 Source-2 Source-3 Source-4 Source-5 Source-6 Source-7 Source-8 Source-9 Source-10 Source-12 Source-13 Source-15 Source-16

Tech Web Development News

This is a PERSONAL and PRIVATE WEBPAGE. Please leave this page. Contact me via email : admin@news-6.com about anything you would like to ask or problem.

Tech News

Disclaimer!
In every post is written below the original source of the post. Copyrights belong on their owners.

Web Development News

HOTELS – CRUISES – CARS – TRAVEL

Recent Posts

  • Our favorite third-party Windows customization tool now lets you clean your storage better
  • One of the best ways to evade Windows 11's system requirements now lets you control when Windows updates
  • Heidi Health raises $65M Series B led by Steve Cohen’s Point72
  • OnePlus 15 to Reportedly Carry the Largest Battery on a OnePlus Smartphone
  • 3 reasons why Perplexity’s Comet has become my go-to browser

Technology - Seo

Categories

  • INDUSTRY NEWS

World Industry News

Privacy & Cookies: This site uses cookies.
To find out more, as well as how to remove or block these, see here: Our Cookie Policy
TECH - WEB DEVELOPMENT NEWS @ COPYRIGHTS 2023