Thursday, May 15, 2025
HomeCyber AttackStayin’ Alive Hacking Teleco & Government Organizations to Deploy Backdoor

Stayin’ Alive Hacking Teleco & Government Organizations to Deploy Backdoor

Published on

SIEM as a Service

Follow Us on Google News

Threat actors target telecoms and government ministries because they house valuable data and infrastructure. 

Telecoms hold sensitive communication records and can disrupt essential services, while government ministries contain classified information, making them attractive targets for the following illicit purposes:-

  • Espionage
  • Financial gain
  • Cyber warfare

Cybersecurity researchers at Check Point have monitored ‘Stayin’ Alive,’ an ongoing campaign since at least 2021, primarily in Asia targeting Telecom and government sectors. 

- Advertisement - Google News

The campaign deploys downloaders and loaders, with one called CurKeep targeting multiple countries, revealing its broader regional focus.

Document
FREE Demo

Deploy Advanced AI-Powered Email Security Solution

Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware

The campaign’s simple, diverse tools appear disposable for downloading payloads. They lack code similarities but connect to ToddyCat, a Chinese-affiliated threat actor in the region.

Infrastructure Analysis

The investigation began with a September 2022 email to a Vietnamese telecom company uploaded to VirusTotal. 

The email contained a ZIP attachment with legitimate and side-loaded files. Execution involves a simple backdoor called ‘CurKeep,’ maintaining persistence via a scheduled task.

CurKeep infection chain
CurKeep infection chain (Source – CheckPoint)

CurKeep samples used C&C servers with a shared TLS certificate (fd31ea84894d933af323fd64d36910ca0c92af99) across multiple IP addresses, likely tied to the same actor.

Stayin’ Alive shared certificate among IP addresses
Stayin’ Alive shared certificate among IP addresses (Source – CheckPoint)

Additional tools used

Here below, we have mentioned all the additional tools that the threat actors use:-

  • CurLu Loader
  • CurCore
  • CurCore Payload
  • CurLog Loader
  • Old Vietnam Lure

The newly discovered StylerServ sample serves files over high ports using passive listening. Five threads monitor specific ports and, if conditions are met, serve encrypted files like ‘stylers.bin’ during remote connections.

These files appear to include a configuration of several file formats and unidentified DWORDs.

Encrypted and decrypted configs
Encrypted and decrypted configs (Source – CheckPoint)

Countries targeted

Here below, we have mentioned all the countries that the threat actors target:-

  • Vietnam
  • Pakistan
  • Uzbekistan
  • Kazakhstan

The following domains are used by CurLog and CurLu loaders that were previously linked to ToddyCat’s infrastructure, with shared connections to 149.28.28[.]159:-

  • fopingu[.]com
  • rtmcsync[.]com

Sophisticated actors increasingly rely on disposable loaders and downloaders to evade detection and attribution. ‘Stayin’ Alive’ demonstrates this trend, targeting high-profile organizations with basic backdoors.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Take advantage of the free trial to ensure 100% security.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Critical BitLocker Flaw Exploited in Minutes: Bitpixie Vulnerability Proof of Concept Unveiled

Security researchers have demonstrated a non-invasive method to bypass Microsoft BitLocker encryption on Windows...

Google Chrome Zero-Day Vulnerability (CVE-2025-4664) Actively Exploited in The Wild

Google has rolled out a fresh Stable Channel update for the Chrome browser across...

Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware

A recent discovery by FortiGuard Labs has unveiled a cunning phishing campaign orchestrated by...

TA406 Hackers Target Government Entities to Steal Login Credentials

The North Korean state-sponsored threat actor TA406, also tracked as Opal Sleet and Konni,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical BitLocker Flaw Exploited in Minutes: Bitpixie Vulnerability Proof of Concept Unveiled

Security researchers have demonstrated a non-invasive method to bypass Microsoft BitLocker encryption on Windows...

Google Chrome Zero-Day Vulnerability (CVE-2025-4664) Actively Exploited in The Wild

Google has rolled out a fresh Stable Channel update for the Chrome browser across...

Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware

A recent discovery by FortiGuard Labs has unveiled a cunning phishing campaign orchestrated by...