Wednesday, April 16, 2025
HomeComputer SecurityOperation Red Signature Deliver's Malware to Target Organizations Through Outside Partner Network

Operation Red Signature Deliver’s Malware to Target Organizations Through Outside Partner Network

Published on

SIEM as a Service

Follow Us on Google News

Supply Chain Attacks occurs is an advanced threat that determines the weak link in the supply chain to infiltrate into the organization network.

Security researchers from TrendMicro and IssueMakersLab uncovered Operation Red Signature that launches supply chain attacks targeting organizations in South Korea.

The Threats actor’s behind Operation Red Signature have compromised the server of the support solution provider to deliver remote access tool “9002 RAT” though the update process. The RAT also contains an exploit tool for vulnerability CVE-2017-7269 and an SQL password dumper.

Threat actor’s configured the update servers of support solution provider to deliver malicious files if the victim in their range of interest based on the IP address and the target organizations.

- Advertisement - Google News

How Operation Red Signature Works

Attackers stolen the codesigning certificates of the support solution providers and signed the malicious files with the stolen certificate and upload to the attacker’s server.

Operation Red Signature

Then the hacked update server of support solution provider is configured to receive the file “update.zip” from the attacker’s server if the user found within the attacker’s interest.

The update.zip contains two files “update.ini” which holds the configuration of remote support solution program and downloads “file000.zip” and “file001.zip” and extracted as “rcview40u.dll” and “rcview.log“.

Operation Red Signature

Then the file “rcview40u.dll” signed with the stolen codesigning certificate will be executed and the DDL files are responsible for decoding the rcview.log file.

The rcview.log is decrypted to 9002 RAT which is the final payload and it connect’s to the C&C server hosted at IP 66[.]42[.]37[.]101.

Researchers said that the 9002 RAT was compiled on July 17, 2018, and starting from 13:35 on July 18 the 9002 RAT being downloaded once the update started. The RAT also serves as a springboard to deliver other malware’s.

Also Read

Beware of Dangerous Android Triout Malware That Records Phone Calls, Videos and Steals Pictures

Dark Tequila Malware Steals Financial Information and Login Details of Popular Websites

New Marap Malware Targeting Financial Institutions Via Microsoft Office and PDF Documents

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

10 Best Email Security Solutions in 2025

Email security solutions are critical for protecting organizations from the growing sophistication of cyber...

WhatsApp Job Offer Scam Targets Job Seekers in New Phishing Attack

A new form of phishing attack is making waves among job seekers, as cybercriminals...

SOC Alert Fatigue Hits Peak Levels As Teams Battle Notification Overload

Security Operations Centers (SOCs) are facing a mounting crisis: alert fatigue. As cyber threats...

Chinese UNC5174 Group Expands Arsenal with New Open Source Tool and C2 Infrastructure

The Sysdig Threat Research Team (TRT) has revealed a significant evolution in the offensive...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Malicious Macros Return in Sophisticated Phishing Campaigns

The cybersecurity landscape of 2025 is witnessing a troubling resurgence of malicious macros in...

Hackers Exploit Node.js to Spread Malware and Exfiltrate Data

Threat actors are increasingly targeting Node.js—a staple tool for modern web developers—to launch sophisticated...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...