Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

New EAGERBEE Variant Targets ISPs and Governments with Advanced Backdoor Capabilities



New EAGERBEE Variant Targets ISPs and Governments with Advanced Backdoor Capabilities

A recent discovery by Kaspersky researchers reveals an updated variant of the EAGERBEE malware framework specifically designed to target ISPs and governmental entities in the Middle East. This new iteration is equipped with advanced features that enable it to deploy additional payloads, enumerate file systems, and execute command shells. Learn more about this latest threat and its implications for cybersecurity.

  • Cybersecurity researchers at Kaspersky have discovered a new variant of the EAGERBEE malware framework targeting ISPs and governmental entities in the Middle East.
  • The new variant features advanced capabilities, including deploying additional payloads, enumerating file systems, and executing command shells.
  • The malware is composed of six key plugins: Plugin Orchestrator, File System Manipulation, Remote Access Manager, Process Exploration, Network Connection Listing, and Service Management.
  • The new variant has been associated with a threat group called CoughingDown with medium confidence by Kaspersky researchers.
  • The EAGERBEE malware framework has evolved significantly from its previous version, which was observed in attacks by a Chinese state-aligned threat cluster tracked as Cluster Alpha.
  • The new variant uses a modular architecture, allowing attackers to control which plugin (module) to load in memory on demand depending on the target of interest.



  • Cybersecurity researchers at Kaspersky have discovered a new variant of the EAGERBEE malware framework, which has been specifically designed to target internet service providers (ISPs) and governmental entities in the Middle East. This latest iteration of the malicious software is equipped with advanced features that allow it to deploy additional payloads, enumerate file systems, and execute command shells, demonstrating a significant evolution in its capabilities.

    According to Kaspersky researchers Saurabh Sharma and Vasily Berdnikov, the key plugins can be categorized into six groups: Plugin Orchestrator, File System Manipulation, Remote Access Manager, Process Exploration, Network Connection Listing, and Service Management. These components work together to provide a robust backdoor that can conduct various malicious activities.

    The new variant of EAGERBEE has been assessed by Kaspersky with medium confidence to be associated with a threat group called CoughingDown. This malware framework was first documented by the Elastic Security Labs and attributed to a state-sponsored and espionage-focused intrusion set dubbed REF5961.

    A previous version of EAGERBEE was observed in attacks by a Chinese state-aligned threat cluster tracked as Cluster Alpha, which was part of a broader cyber espionage operation codenamed Crimson Palace. The goal of this operation was to steal sensitive military and political secrets from a high-profile government organization in Southeast Asia.

    Cluster Alpha overlaps with other threat groups tracked as BackdoorDiplomacy, REF5961, Worok, and TA428. BackdoorDiplomacy is known for exhibiting tactical similarities with another Chinese-speaking group codenamed CloudComputating (aka Faking Dragon), which has been attributed to a multi-plugin malware framework referred to as QSC in attacks targeting the telecom industry in South Asia.

    Kaspersky noted that QSC is a modular framework, where only the initial loader remains on disk while the core and network modules are always in memory. This plugin-based architecture gives attackers the ability to control which plugin (module) to load in memory on demand depending on the target of interest.

    The latest set of attacks involving EAGERBEE features an injector DLL designed to launch the backdoor module, which is then used to collect system information and exfiltrate details to a remote server established via a TCP socket. However, the exact initial entry point used in these intrusions remains unknown at this stage.

    In conclusion, the new variant of EAGERBEE malware framework poses significant threats to ISPs and governmental entities in the Middle East. Its advanced features and modular architecture make it a formidable tool for attackers, highlighting the need for robust cybersecurity measures to protect against such threats.

    Related Information:

  • https://thehackernews.com/2025/01/new-eagerbee-variant-targets-isps-and.html

  • https://www.darkreading.com/cyberattacks-data-breaches/eagerbee-backdoor-middle-east-isps-government-targets


  • Published: Tue Jan 7 11:56:54 2025 by llama3.2 3B Q4_K_M













         


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us