• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

AllTech.News

Chinese Hackers Using New Stealthy Infection Chain to Deploy LODEINFO Malware

You are here: Home / Cyber Security News / Chinese Hackers Using New Stealthy Infection Chain to Deploy LODEINFO Malware

The Chinese state-sponsored risk actor acknowledged as Stone Panda has been observed using a new stealthy an infection chain in its attacks aimed at Japanese entities.

Targets contain media, diplomatic, governmental and community sector corporations and feel-tanks in Japan, in accordance to twin stories posted by Kaspersky.

Stone Panda, also referred to as APT10, Bronze Riverside, Cicada, and Potassium, is a cyber espionage group recognized for its intrusions from companies recognized as strategically substantial to China. The threat actor is believed to have been energetic considering the fact that at minimum 2009.

The most up-to-date set of assaults, noticed between March and June 2022, contain the use of a bogus Microsoft Phrase file and a self-extracting archive (SFX) file in RAR format propagated by using spear-phishing e-mails, top to the execution of a backdoor known as LODEINFO.

While the maldoc involves end users to empower macros to activate the killchain, the June 2022 marketing campaign was identified to drop this process in favor of an SFX file that, when executed, shows a harmless decoy Word doc to conceal the destructive actions.

The macro, when enabled, drops a ZIP archive that contains two data files, a person of which (“NRTOLF.exe”) is a legit executable from the K7Security Suite software which is subsequently applied to load a rogue DLL (“K7SysMn1.dll”) through DLL facet-loading.

The abuse of the security software aside, Kaspersky claimed it also learned in June 2022 one more first an infection process wherein a password-protected Microsoft Word file acted as a conduit to supply a fileless downloader dubbed DOWNIISSA on enabling macros.

“The embedded macro generates the DOWNIISSA shellcode and injects it in the latest system (WINWORD.exe),” the Russian cybersecurity corporation claimed.

DOWNIISSA is configured to communicate with a challenging-coded remote server, working with it to retrieve an encrypted BLOB payload of LODEINFO, a backdoor able of executing arbitrary shellcode, consider screenshots, and exfiltrate documents again to the server.

CyberSecurity

The malware, very first viewed in 2019, has undergone quite a few improvements, with Kaspersky discovered six various variations in March, April, June, and September 2022.

The variations incorporate increased evasion approaches to fly beneath the radar, halting execution on devices with the locale “en_US,” revising the record of supported instructions, and extending guidance for Intel 64-bit architecture.

“LODEINFO malware is up to date extremely commonly and carries on to actively target Japanese companies,” the scientists concluded.

“The up to date TTPs and enhancements in LODEINFO and relevant malware […] indicate that the attacker is especially concentrated on producing detection, assessment and investigation harder for security researchers.”

Located this post appealing? Adhere to THN on Fb, Twitter  and LinkedIn to read extra special content material we publish.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « LockBit Dominates Ransomware Campaigns in 2022: Deep Instinct
Next Post: Apple iPad Pro review (2022): An impressive stopgap »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer
  • Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access
  • Why CTEM is the Winning Bet for CISOs in 2025
  • Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards
  • ⚡ Weekly Recap: Zero-Day Exploits, Insider Threats, APT Targeting, Botnets and More

Copyright © 2025 · AllTech.News, All Rights Reserved.