A very sophisticated and modular backdoor, ShadowPad has been discovered recently by the cybersecurity analysts of Pwc and Secureworks security firm that is actively used by the Chinese threat actors to perform high-profile attacks.
This sophisticated malware came into the spotlight in the year 2017, and it caught the eyes of the security analysts when the malware has been used in two software supply-chain.
While this sophisticated malware is being decrypted by the hackers in the memory using a custom decryption algorithm.
This group is known under different names in the industry of security, and that’s why we have listed the names that are detected:-
The APT41 has executed different kinds of attacks and has attacked several organizations. In the initial stage of the ShadowPad attack, the threat actors have been traced as Bronze Atlas, aka Barium.
After doing a proper investigation it’s been asserted that the ShadowPad is a RAT that is being used by the threat actors to implement shell commands and extra payloads.
The threat actors have initiated the attacks, where the ShadowPad is being processed on the infected or compromised systems of their targets.
So, there is no doubt that ShadowPad is deployed through a method known as DLL sideloading, and here the threat actors generally deliver all kinds of malicious code as a DLL.
However, the malicious DLL loader exports one apparently function named “log” this function generally helps to write a given string to %TEMP%\log.txt, and not only this, but it also does the exporting in its entry point function.
While there are some encoding algorithms, which is a stream cipher that generally takes a 32-bit value. Not only this, but we have mentioned the encoding algorithm below:-
This type of malware payload is generally deployed to a host either encrypted within the DLL loader or embedded inside a separate file along with a DLL loader.
These types of attacks are quite popular, and sophisticated dues to which they do a lot of damage too. So, in this, it is very important to stay alerted and protected from this kind of malware attack.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates.
A critical command injection vulnerability in the popular systeminformation npm package has recently been disclosed, exposing millions…
Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer through…
An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the initial…
A seemingly benign health app, "BMI CalculationVsn," was found on the Amazon App Store, which…
The Lazarus Group has recently employed a sophisticated attack, dubbed "Operation DreamJob," to target employees…
NodeStealer, initially a JavaScript-based malware, has evolved into a more sophisticated Python-based threat that targets…