China-linked Webworm APT updates its arsenal with EchoCreep and GraphWorm backdoors
Webworm has shifted from the McRat and Trochilus remote access trojans to lightweight proxy infrastructure and cloud-based C&C mechanisms.
The company said that its current investigation indicates the attackers accessed only GitHubu2019s internal repositories.
Webworm has shifted from the McRat and Trochilus remote access trojans to lightweight proxy infrastructure and cloud-based C&C mechanisms.
The intrusion chain involved attackers delivering a legitimate executable, a matching .config file, and a malicious DLL designed for sideloading into the trusted process.
The service abused Microsoft Artifact Signing to generate short-term certificates that allowed malware to appear as legitimate software.
The updated malware targets macOS users via fake installers for popular applications including WeChat and Miro.
The upcoming patches will cover Drupal core branches 11.3.x, 11.2.x, 10.6.x, and 10.5.x.
The operation involved law enforcement agencies from 13 countries aiming to dismantle malicious cyber infrastructure and disrupt phishing campaigns.