Monday, March 31, 2025
Homecyber securityNew FamousSparrow Malware Targets Hotels and Engineering Firms with Custom Backdoor

New FamousSparrow Malware Targets Hotels and Engineering Firms with Custom Backdoor

Published on

SIEM as a Service

Follow Us on Google News

ESET researchers have uncovered new activity from the China-aligned APT group FamousSparrow, revealing two previously undocumented versions of their custom SparrowDoor backdoor.

The group, thought to be inactive since 2022, compromised a US-based trade organization in the financial sector and a Mexican research institute in July 2024.

The first variant closely resembles the CrowDoor malware attributed to Earth Estries, while the second introduces a modular architecture.

Both versions demonstrate significant advancements in code quality and implement command parallelization, allowing for simultaneous execution of time-consuming operations.

FamousSparrow Malware
Format of the information sent for each listed file

Expanded Toolkit and Infrastructure

FamousSparrow’s arsenal now includes ShadowPad, a privately sold backdoor typically associated with China-aligned threat actors.

The group utilized a mix of custom and publicly available tools, including PowerHub for post-exploitation and BadPotato for privilege escalation.

The attackers initially deployed an ASHX webshell on compromised IIS servers, likely exploiting vulnerabilities in outdated Windows Server and Microsoft Exchange installations.

They then established interactive PowerShell sessions for reconnaissance and further payload deployment.

SparrowDoor’s evolution includes enhanced persistence mechanisms, utilizing both registry Run keys and Windows services.

The backdoor implements sophisticated network communication, using custom socket classes and RC4 encryption for data transmission.

This campaign marks the first observed use of ShadowPad by FamousSparrow, potentially indicating an expansion of their capabilities.

FamousSparrow Malware
Overview of the compromise chain used in this FamousSparrow campaign

The group’s targets have diversified beyond the hospitality sector to include governments, international organizations, and engineering firms.

ESET researchers note potential overlaps between FamousSparrow and other threat actors like Earth Estries and GhostEmperor.

However, they maintain that FamousSparrow represents a distinct cluster with loose connections to these groups.

The discovery of this recent activity suggests that FamousSparrow has been continuously active and developing its toolset since 2022.

As the threat landscape evolves, organizations in targeted sectors should remain vigilant and implement robust security measures to defend against these sophisticated attacks.

Are you from SOC/DFIR Teams? – Analyse Malware, Phishing Incidents & get live Access with ANY.RUN -> Start Now for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

A New Microsoft Tool Automatically Detects, Diagnoses, and Resolves Boot Issues in Windows

Microsoft has unveiled a transformational tool aimed at addressing one of the most frustrating...

Beware! A Fake Zoom Installer Drops BlackSuit Ransomware on Your Windows Systems

Cybersecurity analysts have uncovered a sophisticated campaign exploiting a fake Zoom installer to deliver...

Linux Distribution Nitrux3.9.1  Releaed – What’s New

Nitrux Linux, renowned for its innovative approach to desktop computing, has unveiled its latest...

Hackers Distributing Phishing Malware Via SVG Format To Bypass File Detection

Cybersecurity experts at the AhnLab Security Intelligence Center (ASEC) have uncovered a novel phishing...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

A New Microsoft Tool Automatically Detects, Diagnoses, and Resolves Boot Issues in Windows

Microsoft has unveiled a transformational tool aimed at addressing one of the most frustrating...

Beware! A Fake Zoom Installer Drops BlackSuit Ransomware on Your Windows Systems

Cybersecurity analysts have uncovered a sophisticated campaign exploiting a fake Zoom installer to deliver...

Linux Distribution Nitrux3.9.1  Releaed – What’s New

Nitrux Linux, renowned for its innovative approach to desktop computing, has unveiled its latest...