Friday, April 4, 2025
HomeAPTEarth Alux Hackers Use VARGIET Malware to Target Organizations

Earth Alux Hackers Use VARGIET Malware to Target Organizations

Published on

SIEM as a Service

Follow Us on Google News

A new wave of cyberattacks orchestrated by the advanced persistent threat (APT) group Earth Alux has been uncovered, revealing the use of sophisticated malware, including the VARGEIT backdoor, to infiltrate critical industries.

Linked to China, Earth Alux has been targeting organizations across the Asia-Pacific (APAC) region and Latin America since 2023, focusing on sectors such as government, technology, logistics, manufacturing, telecommunications, IT services, and retail.

Earth Alux Hackers
Overview of Earth Alux

The group’s primary toolset includes VARGEIT, a multi-stage backdoor capable of maintaining long-term persistence in compromised systems.

VARGEIT is often combined with other tools like COBEACON and deployed through advanced techniques such as DLL sideloading and timestomping.

These methods allow Earth Alux to evade detection while conducting cyberespionage activities that include data collection, reconnaissance, and exfiltration.

Technical Insights into the VARGEIT Backdoor

VARGEIT operates as a modular backdoor with extensive capabilities.

It enables attackers to execute commands, collect system information, and inject additional tools into processes like mspaint.exe for fileless operations.

The malware uses multiple communication channels, including HTTP, reverse TCP/UDP, and even Microsoft Outlook via Graph API.

According to Trend Micro, this versatility allows Earth Alux to maintain control over compromised systems while minimizing its footprint.

The initial stage of an attack typically involves exploiting vulnerabilities in exposed servers to implant web shells such as GODZILLA.

From there, the group deploys first-stage backdoors like COBEACON or VARGEIT using methods such as debugger scripts or encrypted payloads.

Subsequent stages leverage tools like RAILLOAD for loading encrypted configurations and RAILSETTER for persistence through timestomping and scheduled tasks.

Earth Alux Hackers
 RAILLOAD loading sequence

Targeted Industries and Geographical Spread

Initially observed in APAC countries like Thailand, the Philippines, Malaysia, and Taiwan during 2023, Earth Alux expanded its reach to Latin America by mid-2024.

The group’s focus on high-value industries underscores its intent to obtain sensitive information that could disrupt operations or result in significant financial losses for targeted organizations.

To counter threats posed by Earth Alux’s advanced toolkit, organizations are advised to adopt proactive cybersecurity measures:

  • Regularly patch and update systems to close vulnerabilities exploited during initial access.
  • Monitor for unusual activity such as unexpected network traffic or reduced system performance.
  • Deploy comprehensive security solutions that provide endpoint detection and response capabilities to identify and mitigate threats in real time.

Earth Alux’s evolving tactics highlight the importance of vigilance in today’s cybersecurity landscape.

By understanding their techniques and implementing robust defenses, organizations can reduce their risk of falling victim to these sophisticated attacks.

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Ex-ASML Russian Employee Smuggled Trade Secrets to Moscow via USB

A former employee of Dutch semiconductor firm ASML, identified as German A. (43), stands...

Critical Apache Parquet Vulnerability Allows Remote Code Execution

A severe vulnerability has been identified in the Apache Parquet Java library, specifically within...

Halo ITSM Vulnerability Lets Attackers Inject Malicious SQL Code

A critical security flaw has been discovered in Halo ITSM, an IT support management software...

Australian Pension Funds Hacked: Members Face Financial Losses

Several of Australia’s largest superannuation funds have been targeted in a coordinated cyberattack, leading...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ex-ASML Russian Employee Smuggled Trade Secrets to Moscow via USB

A former employee of Dutch semiconductor firm ASML, identified as German A. (43), stands...

Critical Apache Parquet Vulnerability Allows Remote Code Execution

A severe vulnerability has been identified in the Apache Parquet Java library, specifically within...

Halo ITSM Vulnerability Lets Attackers Inject Malicious SQL Code

A critical security flaw has been discovered in Halo ITSM, an IT support management software...