Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Operation Hanoi Thief Attacking IT Professionals with Pseudo-Polyglot Payload to Hide Malware

Operation Hanoi Thief Attacking IT Professionals with Pseudo-Polyglot Payload to Hide Malware

Posted on December 1, 2025December 2, 2025 By CWS

A complicated cyberespionage marketing campaign dubbed “Operation Hanoi Thief” has surfaced, particularly focusing on IT professionals and recruitment groups in Vietnam.

Found on November 3, 2025, this menace exercise employs a fancy multi-stage an infection chain designed to reap delicate browser credentials and historical past.

The attackers leverage a malicious spear-phishing technique, distributing a ZIP archive named Le-Xuan-Son_CV.zip, which masquerades as a official job software from a software program developer primarily based in Hanoi.

The an infection initiates when a sufferer interacts with a shortcut file, CV.pdf.lnk, contained inside the archive. This file triggers a sequence of occasions using “Dwelling off the Land” (LOLBin) ways.

Particularly, it abuses the Home windows ftp.exe utility with the -s flag to execute a batch script hidden inside a pseudo-polyglot file named offsec-certified-professional.png.

This file dual-functions as a innocent picture lure and a malicious container, successfully evading conventional detection mechanisms by burying its payload inside official picture headers.

Knowledge Exfiltration (Supply – Seqrite)

This command line argument is a important indicator of the assault’s stealthy nature.

Seqrite safety analysts recognized that this marketing campaign is probably going of Chinese language origin, citing overlaps in ways with earlier state-sponsored actions.

The first goal seems to be intelligence gathering, specializing in the theft of login information and looking habits from victims within the know-how and HR sectors.

By exploiting the belief inherent in recruitment processes, the menace actors efficiently bypass preliminary perimeter safety layers.

Technical Evaluation of the LOTUSHARVEST Payload

The core of this assault is the execution of the LOTUSHARVEST implant. As soon as the preliminary script runs, it abuses DeviceCredentialDeployment.exe to hide its command-line actions and renames system utilities like certutil.exe to lala.exe to bypass monitoring.

Within the an infection chain, the script then extracts a base64-encoded blob from the polyglot file, decoding it right into a malicious DLL named MsCtfMonitor.dll.

An infection Chain (Supply – Seqrite)

This DLL is side-loaded utilizing a official ctfmon.exe binary copied to the C:ProgramData listing.

LOTUSHARVEST features as a sturdy info stealer, using anti-analysis checks like IsDebuggerPresent and IsProcessorFeaturePresent to crash if analyzed.

It targets Google Chrome and Microsoft Edge, querying SQLite databases to extract the highest 20 visited URLs and decrypting as much as 5 saved credentials utilizing CryptUnprotectData.

Lastly, the stolen information is formatted into JSON and exfiltrated by way of an HTTPS POST request to the attacker-controlled server eol4hkm8mfoeevs.m.pipedream.internet/service.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attacking, Hanoi, Hide, Malware, Operation, Payload, Professionals, PseudoPolyglot, Thief

Post navigation

Previous Post: Hackers Registered 2,000+ Fake Holiday-Themed Online Stores to Steal User Payments
Next Post: KimJongRAT Attacking Windows Users via Weaponized .hta Files to Steal Logins

Related Posts

Chinese Hackers Use Rootkit to Hide ToneShell Malware Activity Chinese Hackers Use Rootkit to Hide ToneShell Malware Activity Cyber Security News
Linux Kernel ksmbd Filesystem Vulnerability Exploited Linux Kernel ksmbd Filesystem Vulnerability Exploited Cyber Security News
WhatsApp New Strict Account Settings Option to Protect Your Account from Hackers WhatsApp New Strict Account Settings Option to Protect Your Account from Hackers Cyber Security News
New Beast Ransomware Actively Scans for Active SMB Port from Breached System to Spread Across Network New Beast Ransomware Actively Scans for Active SMB Port from Breached System to Spread Across Network Cyber Security News
Windows 11 25H2 Update Preview Released, What’s New? Windows 11 25H2 Update Preview Released, What’s New? Cyber Security News
Ashen Lepus Hacker Group Attacks Eastern Diplomatic Entities With New AshTag Malware Ashen Lepus Hacker Group Attacks Eastern Diplomatic Entities With New AshTag Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark