{"id":7279,"date":"2025-10-03T00:29:27","date_gmt":"2025-10-03T00:29:27","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=7279"},"modified":"2025-10-03T00:29:27","modified_gmt":"2025-10-03T00:29:27","slug":"confucius-hackers-hit-pakistan-with-new-wooperstealer-and-anondoor-malware","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=7279","title":{"rendered":"Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Oct 02, 2025<\/span><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><\/span><span class=\"p-tags\">Malware \/ Cyber Espionage<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhs19se3oOTe2LKNLUVG1eUCTWL7f7pmFyqFtBgj7tSlhbaY6nRVkoXwoPqW8fGjhLJsxkQYJXs4_1_VfbE2BhpB-_4qQ8YBbRyp39sdMuBB_Lr_LWxBS7mbyL4UN1wi-jbbPaiysanHv-G_fBH4edQvQRSHNX4IRTvdSRL6ZDvRgcZ02svkL14zVCL0Tji\/s790-rw-e365\/pakistan-cyberattack.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhs19se3oOTe2LKNLUVG1eUCTWL7f7pmFyqFtBgj7tSlhbaY6nRVkoXwoPqW8fGjhLJsxkQYJXs4_1_VfbE2BhpB-_4qQ8YBbRyp39sdMuBB_Lr_LWxBS7mbyL4UN1wi-jbbPaiysanHv-G_fBH4edQvQRSHNX4IRTvdSRL6ZDvRgcZ02svkL14zVCL0Tji\/s790-rw-e365\/pakistan-cyberattack.jpg\" alt=\"\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\"\/><\/a><\/div>\n<p>The risk actor often called Confucius has been attributed to a brand new phishing marketing campaign that has focused Pakistan with malware households like WooperStealer and Anondoor.<\/p>\n<p>&#8220;Over the previous decade, Confucius has repeatedly focused authorities businesses, navy organizations, protection contractors, and significant industries &#8212; particularly in Pakistan \u2013 utilizing spear-phishing and malicious paperwork as preliminary entry vectors,&#8221; Fortinet FortiGuard Labs researcher Cara Lin <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/confucius-espionage-from-stealer-to-backdoor\" rel=\"noopener\" target=\"_blank\">stated<\/a>.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/thehackernews.com\/2024\/11\/apt-k-47-uses-hajj-themed-lures-to.html\" rel=\"noopener\" target=\"_blank\">Confucius<\/a> is a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/thehackernews.com\/2025\/06\/bitter-hacker-group-expands-cyber.html\" rel=\"noopener\" target=\"_blank\">long-running hacking group<\/a> that is believed to have been energetic since 2013 and working throughout South Asia. Current campaigns undertaken by the risk actor have employed a Python-based backdoor referred to as Anondoor, signaling an evolution of the group&#8217;s tradecraft and its technical agility.<\/p>\n<div class=\"dog_two clear\"><center class=\"cf\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/thehackernews.uk\/cloud-insight-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"DFIR Retainer Services\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjzU4HTrkySm0XtyBVGRYE0rh0Fu057BcqLPyQ1DkQue9iJF64vs2nAMMK_e93VgilDx3SGrwBOcUItR7l3WC46QCzJJznACknx0e3BkN5Hl5oW0T4adCH97EPaL2urebcGd8Ijj4t5a_FDHSrZnYEneLlQN4pORoNzFAHU2_kDDHlrOV7iMsKTIrcI3nWB\/s728-rw-e100\/cloud-insight-d.png\" width=\"729\" height=\"91\"\/><\/a><\/center><\/div>\n<p>One of many assault chains documented by Fortinet focused customers in Pakistan someday in December 2024, tricking recipients into opening a .PPSX file, which then triggers the supply of WooperStealer utilizing DLL side-loading methods.<\/p>\n<p>A subsequent assault wave noticed in March 2025 has been discovered to make use of Home windows shortcut (.LNK) recordsdata to unleash the malicious WooperStealer DLL, once more launched utilizing DLL side-loading, to steal delicate information from compromised hosts.<\/p>\n<p>One other .LNK file noticed in August 2025 additionally leveraged related ways to sideload a rogue DLL, solely this time the DLL paves the best way for Anondoor, a Python implant that is designed to exfiltrate gadget info to an exterior server and await additional duties to execute instructions, take screenshots, enumerate recordsdata and directories, and dump passwords from Google Chrome. <\/p>\n<div class=\"separator\" style=\"clear: both;\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgANDfSKa2_rblualBGbrSQk9uSUpoI4Cku-mMGsJI_uYwPEpWuHGsAE6TzH1Li3Oz5y9KzAZmh96CfTVkvqwLnwoIoCsfjYdfIdIIkSHID7LH-zGK1mTXXU0HgoEJNCTIoLva8ArZraatRrRjJuIHeUVJwgJDcVJr4JMvAAkXOBNQwZCLFsfkVK23SbBW4\/s2600\/docs.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgANDfSKa2_rblualBGbrSQk9uSUpoI4Cku-mMGsJI_uYwPEpWuHGsAE6TzH1Li3Oz5y9KzAZmh96CfTVkvqwLnwoIoCsfjYdfIdIIkSHID7LH-zGK1mTXXU0HgoEJNCTIoLva8ArZraatRrRjJuIHeUVJwgJDcVJr4JMvAAkXOBNQwZCLFsfkVK23SbBW4\/s2600\/docs.jpg\" alt=\"\" border=\"0\" data-original-height=\"642\" data-original-width=\"1159\"\/><\/a><\/div>\n<p>It is value noting that the risk actor&#8217;s use of Anondoor was <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/thehackernews.com\/2025\/07\/tag-140-deploys-drat-v2-rat-targeting.html\" rel=\"noopener\" target=\"_blank\">documented<\/a> in July 2025 by Seebug&#8217;s KnownSec 404 Staff.<\/p>\n<p>&#8220;The group has demonstrated robust adaptability, layering obfuscation methods to evade detection and tailoring its toolset to align with shifting intelligence-gathering priorities,&#8221; Fortinet stated. &#8220;Its current campaigns not solely illustrate Confucius&#8217; persistence but in addition its skill to pivot quickly between methods, infrastructure, and malware households to keep up operational effectiveness.&#8221;<\/p>\n<div class=\"dog_two clear\"><center class=\"cf\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/thehackernews.uk\/platform-shield-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"CIS Build Kits\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg6GpYnSEVgX-9xu8f-VEj7xbwYz7E6zxE6xL0Mfd6tE2wQ213wwvT8vkv9eqwMuEfEQllm8YJQUQglXFcA0kr6LlEYLvq7Lskyu5defaNo2Xq02wIg4tsGvkRuvj2DsW6rc3rfqDiqjQ3PolYAj0VqrBW2E7d70thPArHjR2RGL_UIVsJS0H_kmMOqjk9t\/s728-rw-e100\/cis-d.png\" width=\"729\" height=\"91\"\/><\/a><\/center><\/div>\n<p>The disclosure comes as K7 Safety Labs detailed an an infection sequence related to the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/thehackernews.com\/2024\/07\/patchwork-hackers-target-bhutan-with.html\" rel=\"noopener\" target=\"_blank\">Patchwork<\/a> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/thehackernews.com\/2025\/07\/patchwork-targets-turkish-defense-firms.html\" rel=\"noopener\" target=\"_blank\">group<\/a> that commences with a malicious macro that is designed to obtain a .LNK file containing PowerShell code accountable for downloading further payloads and leveraging DLL side-loading to launch the first malware whereas concurrently displaying a decoy PDF doc.<\/p>\n<p>The ultimate payload, for its half, establishes contact with the risk actor&#8217;s command-and-control (C2) server, gathers system info, and retrieves an encoded instruction that is subsequently decrypted for execution utilizing cmd.exe. It is also outfitted to take screenshots, add recordsdata from the machine, and obtain recordsdata from a distant URL and save them regionally in a brief listing.<\/p>\n<p>&#8220;The malware waits for a configurable interval and retries sending the information as much as 20 occasions, monitoring failures to make sure persistent and stealthy information exfiltration with out alerting the consumer or safety techniques,&#8221; the corporate <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/labs.k7computing.com\/index.php\/breakingdown-of-patchwork-apt\/\" rel=\"noopener\" target=\"_blank\">stated<\/a>.<\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>\ue802Oct 02, 2025\ue804Ravie LakshmananMalware \/ Cyber Espionage The risk actor often called Confucius has been attributed to a brand new phishing marketing campaign that has focused Pakistan with malware households like WooperStealer and Anondoor. &#8220;Over the previous decade, Confucius has repeatedly focused authorities businesses, navy organizations, protection contractors, and significant industries &#8212; particularly in Pakistan [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":7281,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[5685,5683,554,2080,216,2878,5684],"class_list":["post-7279","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-anondoor","tag-confucius","tag-hackers","tag-hit","tag-malware","tag-pakistan","tag-wooperstealer"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/7279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7279"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/7279\/revisions"}],"predecessor-version":[{"id":7280,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/7279\/revisions\/7280"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/7281"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-06 19:24:22 UTC -->