Monday, May 5, 2025
HomeCVE/vulnerabilityA Massive Hacking Toolkit From "You Dun" Threat Group Developed To Lauch...

A Massive Hacking Toolkit From “You Dun” Threat Group Developed To Lauch Massive Cyber Attack

Published on

SIEM as a Service

Follow Us on Google News

The “You Dun” hacking group exploited vulnerable Zhiyuan OA software using SQL injection, leveraging tools like WebLogicScan, Vulmap, and Xray for reconnaissance.

They further escalated privileges on compromised hosts with tools like traitor and CDK. 

Active Cobalt Strike server leaked, revealing its use in various cyberattacks, including ransomware deployment (LockBit 3) and data theft.

- Advertisement - Google News

The threat actor, associated with “Dark Cloud Shield Technical Team” and “EVA,” leveraged the leaked tools to conduct malicious activities.

The attacker used WebLogicScan and vulmap.py scripts to identify WebLogic vulnerabilities on various targets, and an Xray scanner was employed for broader vulnerability detection on two Chinese websites. 

Bash history excerpts
Bash history excerpts

The threat actor utilized research to identify vulnerable web paths, then exploited a Zhiyuan OA vulnerability with seeyon_exp to deploy JSPX web shells, which were used to launch SQLmap attacks against multiple targets, including a South Korean pharmaceutical organization to extract sensitive data.

Protecting Your Networks & Endpoints With UnderDefense MDR – Request Free Demo

The threat actor compromised a Zhiyuan OA instance by utilizing the Weaver tool for vulnerability scanning and exploitation and the Cobalt Strike platform. 

They deployed a sophisticated toolkit, including TaoWu and Landon, to enhance Cobalt Strike’s capabilities. This enabled them to execute various malicious activities, such as credential theft, lateral movement, and persistence, on the compromised system.

open directory
open directory

They also used Cobalt Strike’s Ladon plugin to automate intrusion on a Bitnami WordPress server. Initial access likely exploited a WordPress plugin WPCargo vulnerability (CVE-2021-25003) and Viper C2 with the Metasploit backend delivered the final payload. 

The attacker exploited a Docker container vulnerability using CDK, then escalated privileges further using the mount-cgroup module and the Traitor tool to gain unauthorized access to the system.

Traitor tool
Traitor tool

The adversary possessed LockBit ransomware (.local/LB3.exe) and deleted RAR archives containing the LockBit Black builder, which was likely used to build custom ransomware variants.

The threat actor targeted multiple countries, primarily China, South Korea, and Iran. Their reconnaissance activities involved scanning various industries, including government, education, health, and logistics, for vulnerabilities using tools like Vulmap and WebLogicScan. 

opendir
opendir

Analysis of an open directory revealed infrastructure used by a threat actor, including SSH servers with a matching fingerprint proxied through multiple IPs likely added via VIM.

Malicious actors use the f8x script downloaded from f8x.io to automate security tooling installation on compromised systems. Options like “-all” and “-viper” likely control the specific tools installed. 

According to the DFIR Report, evidence suggests a Chinese-speaking threat actor using Telegram channels (You_Dun, You_Dun888) for communication and boasting about defacements, data leaks, and offering illegal services like penetration testing and DDoS attacks. 

Run private, Real-time Malware Analysis in both Windows & Linux VMs. Get a 14-day free trial with ANY.RUN!

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

SonicBoom Attack Chain Lets Hackers Bypass Login and Gain Admin Control

Cybersecurity researchers have uncovered a dangerous new exploitation technique, dubbed the "SonicBoom Attack Chain,"...

Researcher Uses Copilot with WinDbg to Simplify Windows Crash Dump Analysis

A researcher has unveiled a novel integration between AI-powered Copilot and Microsoft's WinDbg, dramatically...

Apache Parquet Java Vulnerability Enables Remote Code Execution

A high-severity vulnerability (CVE-2025-46762) has been discovered in Apache Parquet Java, exposing systems using...

NCSC Warns of Ransomware Attacks Targeting UK Organisations

National Cyber Security Centre (NCSC) has issued technical guidance following a series of cyber...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

SonicBoom Attack Chain Lets Hackers Bypass Login and Gain Admin Control

Cybersecurity researchers have uncovered a dangerous new exploitation technique, dubbed the "SonicBoom Attack Chain,"...

Researcher Uses Copilot with WinDbg to Simplify Windows Crash Dump Analysis

A researcher has unveiled a novel integration between AI-powered Copilot and Microsoft's WinDbg, dramatically...

Apache Parquet Java Vulnerability Enables Remote Code Execution

A high-severity vulnerability (CVE-2025-46762) has been discovered in Apache Parquet Java, exposing systems using...