Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

URL has been copied successfully!
Salt Typhoon may have upgraded backdoors for efficiency and evasion
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

CrowDoor and attributed to the Earth Estries APT group in November 2024.”GhostSparrow, aka Salt Typhoon (Microsoft), Earth Estries (Trend Micro), Ghost Emperor (Kaspersky Labs), and UNC2286 (Mandiant), has escalated cyber espionage, breaching US telecom networks and accessing data on over a million individuals. One of the key features ESET reported on the two previously unseen variants is their ability to execute parallel commands. This means the new variants can execute tasks in parallel threads to enhance efficiency, evade detection, and maintain persistence.”The most significant change is the parallelization of time-consuming commands, such as file I/O and the interactive shell,” ESET said. “This allows the backdoor to continue handling new commands while those tasks are performed.”The concurrent running of critical yet time consuming operations to new commands makes detection and disruption harder as tasks like data exfiltration or system modification continues uninterrupted even as backdoor analysis or interruption is attempted.Additionally, the new modularity introduced within the backdoor allows it to dynamically update configurations, switch between multiple C&C servers, and execute custom payloads without redeployment, according to ESET. New variants used in attacks on US and Mexican organizations: ESET researchers reported spotting the SparrowDoor variants while investigating a security incident in July 2024 at a finance trade group operating in the US.”While helping the affected entity remediate the compromise, we made the unexpected discovery in the victim’s network,” the researchers said. “This campaign is also the first documented time FamousSparrow used ShadowPad, a privately sold backdoor, known to only be supplied to China-aligned threat actors.”The campaign extended to a breach of a research institute in Mexico, two days prior to the US compromise. When researchers fed the techniques and IoCs into a tracking system, it revealed additional activities, one of which was an attack on a government institute in Honduras. ESET is still investigating the others.While ESET attributes the July campaign to the entity it tracks as FamousSparrow with high confidence, the firm has reservations about identifying it as Microsoft’s Salt Typhoon. “There are a few overlaps between the two but many discrepancies,” it said. “Based on our data and analysis of the publicly available reports, FamousSparrow appears to be its own distinct cluster with loose links to (Salt Typhoon),” While Microsoft claims Salt Typhoon is the same as FamousSparrow and GhostEmperor, the threat intelligence leader has yet to attribute any such activities as discovered by ESET researchers.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3856291/salt-typhoon-may-have-upgraded-backdoors-for-efficiency-and-evasion.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link