ThreatCluster
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

Storm-2603 Deploys Custom Malware Using BYOVD to Bypass Endpoint Protections

Threat Score:
53
GB Hackers
1 day ago
Part of cluster #1534

Overview

Storm-2603 Deploys Custom Malware Using BYOVD to Bypass Endpoint Protections Check Point Research (CPR) has delved into the operations of Storm-2603, a recently identified threat actor linked to Chinese advanced persistent threat (APT) groups, amid widespread exploitation of Microsoft SharePoint Server vulnerabilities known as “ToolShell.” This campaign exploits four critical CVEs CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, and CVE-2025-53771 to facilitate intrusions, with Storm-2603 deployi...

Continue Reading on Original Site

Related Articles

5 articles
1

New Linux backdoor Plague bypasses auth via malicious PAM module

Security Affairs • 1 hour ago

A stealthy Linux backdoor named Plague, hidden as a malicious PAM module, allows attackers to bypass auth and maintain persistent SSH access. Nextron Systems researchers discovered a new stealthy Linux backdoor called Plague, hidden as a malicious PAM (Pluggable Authentication Module) module. It silently bypasses authentication and grants persistent SSH access. A Pluggable Authentication Module […]

Score
88
Read more
2

China Presses Nvidia Over Alleged Backdoors in H20 Chips Amid Tech Tensions

Security Affairs • 2 hours ago

China questioned Nvidia over suspected backdoors in its H20 chips, adding to rising tensions in the tech fight between the U.S. and Beijing. China’s internet watchdog has summoned Nvidia over concerns that its H20 AI chips may contain hidden backdoors. Nvidia H20 chips are AI GPUs tailored for the Chinese market, based on Hopper architecture. […]

Score
83
Read more
3

CL-STA-0969 Installs Covert Malware in Telecom Networks During 10-Month Espionage Campaign

The Hacker News • 8 hours ago

Telecommunications organizations in Southeast Asia have been targeted by a state- threat actor known asCL-STA-0969to facilitate remote control over compromised networks. Palo Alto Networks Unit 42 said it observed multiple incidents in the region, including one aimed at critical telecommunications infrastructure between February and November 2024. The attacks are characterized by the use of several tools to enable remote access, as well as the deployment of Cordscan, which can collect location d

Score
78
Read more
4

Julio de 2025: los ataques cibernéticos más grandes, ataques de ransomware e violaciones de datos

Ciberseguridadpyme • 14 hours ago

La ⁣ciberseguridad se ha convertido en una preocupación seria ya que nuestras ⁢vidas⁣ están significativamente entrelazadas con las tecnologías digitales. Julio de 2025 ha ‍demostrado ser un punto de inflexión debido a algunos de⁣ los mayores ataques⁤ cibernéticos, ataques de ransomware y violaciones de datos presenciadas en⁢ múltiples sectores ⁤y regiones⁣ a nivel mundial. los […] La entrada Julio de 2025: los ataques cibernéticos más grandes, ataques de ransomware e violaciones de datos se pub

Score
76
Read more
5

📥 Download the complete threat report to uncover the full scale of the FBI-flagged Funnull DNS infrastructure ->> https://lnkd.in/ehSBvCBx The FBI's recent FLASH alert exposed #Funnull as the backbone of a global cryptocurrency #fraud operation active since - LinkedIn

News • 6 hours ago

EnglishUnited States Deutsch English Español Français Italiano العربية All languages Afrikaans azərbaycan bosanski català Čeština Cymraeg Dansk Deutsch eesti EnglishUnited Kingdom EspañolEspaña EspañolLatinoamérica euskara Filipino FrançaisCanada FrançaisFrance Gaeilge galego Hrvatski Indonesia isiZulu íslenska Italiano Kiswahili latviešu lietuvių magyar Melayu Nederlands norsk o‘zbek polski PortuguêsBrasil PortuguêsPortugal română shqip Slovenčina slovenščina srpski (latinica) Suomi Svenska Tiế

Score
75
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

CVES
CVE-2025-49704
CVE-2025-49706
CVE-2025-53770
CVE-2025-53771
FILE PATH
C:\Users\Administrator\Desktop\work\tools\ak47c2, supports sophisticated backdoors.
ATTACK TYPES
Advanced Persistent Threat
Data Exfiltration
Exploitation
Exploitation of Public-Facing Applications
Phishing
INDUSTRIES
Cybersecurity
Education
Information Technology
VULNERABILITIES
DDoS
DoS
Privilege Escalation
Remote Code Execution
COMPANIES
AMD
Adobe
Amazon
Apple
Cisco
SECURITY VENDORS
Check Point
Check Point Research
Cloudflare
PLATFORMS
AWS
Android
Apache
Azure
IIS
APT GROUPS
Careto
Storm-2603
RANSOMWARE
AnDROid
Cmd
Desktop
LockBit
One
MITRE ATT&CK
Phishing
T1046
T1047
T1055
T1059.001
MALWARE
AK47 C2
Careto
Dark
DOMAINS
update.updatemicfosoft.com
COUNTRIES
China
United States
DOMAINS
update.updatemicfosoft.com
ARTICLE INFORMATION
Article #6685
Published 1 day ago
GB Hackers

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration