Monday, April 28, 2025
HomeMalwareWildPressure APT Hackers Uses New Malware to Attack Both Windows & macOS...

WildPressure APT Hackers Uses New Malware to Attack Both Windows & macOS Operating Systems

Published on

SIEM as a Service

Follow Us on Google News

WildPressure has been attacking Windows for a long time, that’s why this is not the first time when Windows and macOS operating systems are being attacked by such malicious trojan.

However, in 2019 Kaspersky had detected a malicious trojan named “Milum” that has been used by the threat actors of WildPressure. 

Since then Kaspersky has been tracking the Milum Trojan, and recently the threat actors have used a newer version of this Trojan to attack both Windows and macOS operating systems.

- Advertisement - Google News

According to the report, WildPressure was initially noted in March 2020 based on a malware operation assigning a fully-featured C++ Trojan “Milum”.

The Trojan generally allows the threat actors to obtain remote control of the devices that have been compromised in the attack.

Why it’s known as Milum & it’s of interest?

During an investigation, the experts came out with some key details regarding the attack. According to the analysis, the word ‘milum’ is applied in the C++ class names that are present inside the malware, thus the trojan was named Milum.

Apart from this, another point is that this malware generally exports lots of Zlib concentration functions, like zlibVersion(), inflate(), or deflate(). 

Even the researchers also noted that all these concentration functions are needed for C2 communication, but in the case of standalone applications, exportation does not require.

Who was attacked & who’s behind it?

The Milum trojan has initially attacked the operating system of Windows and macOS, and it has been attacking the system since 2019. After investigating the attack, the experts noted that a vast majority of IPs belong to the Middle East.

Not only this, but the experts have also pronounced that they believe that network scanners, TOR exit nodes, or VPN connections also belonged to the Middle East.

However, the analysts, yet not confirmed that who is behind this attack, but they are trying their best to find each key detail. 

Moreover, the researchers also claimed that it is quite difficult to find that who was behind this, as the threat actors have used a very common C++ code.

Apart from this the analysis also affirmed that the configuration data and communication protocol that the malware has used in the attack are base64-encoded JSON-formatted configuration.

And all the data that has been hijacked were stored in the binary’s resource section and it has been analyzed with Standard Template Library (STL) functions. 

As the investigation is going the experts are discovering the key details, such as the WildPressure also used Python as a programming language for its malware in this attack. 

So, that’s why they declared that they will keep monitoring the malware closely until and unless they don’t get all the information.

Indicators of compromise

Files MD5
0C5B15D89FDA9BAF446B286C6F97F535
17B1A05FC367E52AADA7BDE07714666B
A76991F15D6B4F43FBA419ECA1A8E741
Original file names are Milum46_Win32.exe; on the target side they exist as system32.exe

URLs
upiserversys1212[.]com/rl.php
37.59.87[.]172/page/view.php
80.255.3[.]86/page/view.php

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

Advanced Multi-Stage Carding Attack Hits Magento Site Using Fake GIFs and Reverse Proxy Malware

A multi-stage carding attack has been uncovered targeting a Magento eCommerce website running an...

Hannibal Stealer: Cracked Variant of Sharp and TX Malware Targets Browsers, Wallets, and FTP Clients

A new cyber threat, dubbed Hannibal Stealer, has surfaced as a rebranded and cracked...