Confucius Hackers Deploy Wooperstealer to Target Government and Military Entities

The notorious Confucius hacking group has launched a sophisticated cyber campaign targeting government and military entities across South and East Asia. First identified in 2016, this advanced persistent threat (APT) group has evolved its malware arsenal with a new componentized backdoor system called “anondoor.”
This latest campaign marks a significant escalation in their technical capabilities, transforming simple downloader trojans into a modular framework that dynamically loads malicious components from command-and-control servers. The attack begins with a weaponized LNK file that downloads multiple components, including the core anondoor backdoor disguised as python313.dll, alongside a legitimate Python executable as a decoy.


Researchers from Seebug have noted the malware's unprecedented evasion techniques, utilizing a parameterized communication mechanism that obscures its infrastructure from security analysts. The modular design allows attackers to deploy specific capabilities based on target needs, including the wooperstealer data exfiltration module, which is integrated as a downloadable component.
To ensure persistence, the malware creates a Windows scheduled task named “SystemCheck,” allowing continuous execution across reboots. Intelligence agencies have observed active campaigns targeting critical infrastructure and defense organizations, with the malware's modular nature enabling customized attacks while maintaining operational security.
Current antivirus detection rates are nearly zero due to the malware's sophisticated sandbox evasion techniques and dynamic loading architecture, posing significant challenges for traditional security solutions.


Dynamic Component Loading and Communication Protocol
The anondoor backdoor employs a unique component orchestration system that fundamentally alters its operation compared to traditional threats. It uses a UUID generation algorithm that combines hardware fingerprinting and system information to create persistent victim identifiers. The communication protocol utilizes base64-encoded requests containing victim UUIDs and control commands, with the server responding with component download URLs and execution instructions. This architecture allows the Confucius group to maintain granular control over their deployed capabilities while complicating forensic analysis and network detection efforts.
- Other (43)
- Ransomware (153)
- Events and News (27)
- Features (45)
- Security (483)
- Tips (79)
- Google (28)
- Achievements (11)
- Products (35)
- Activation (7)
- Dealers (1)
- Bank Phishing (49)
- Malware Alerts (226)
- Cyber Attack (285)
- Data Backup (13)
- Data Breach (116)
- Phishing (163)
- Securty Tips (2)
- Browser Hijack (19)
- Adware (15)
- Email And Password (70)
- Android Security (74)
- Knoweldgebase (38)
- Botnet (16)
- Updates (4)
- Alert (71)
- Hacking (67)
- Social Media (8)
- vulnerability (68)
- Hacker (36)
- Spyware (11)
- Windows (8)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (3)
- Website hacks (8)
- Paytm (1)
- Credit card scam (2)
- Telegram (3)
- RAT (6)
- Bug (3)
- Twitter (2)
- Facebook (8)
- Banking Trojan (9)
- Mozilla (2)
- COVID-19 (5)
- Instagram (3)
- NPAV Announcement (9)
- IoT Security (1)
- Deals and Offers (2)
- Cloud Security (12)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (3)
- WhatsApp (5)
- Amazon (2)
- DMart (1)
- Payment Risk (5)
- Occasion (3)
- firewall (2)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (29)
- Impersonation phishing (1)
- DDoS (7)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)
- Fraud Protector (17)