Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
State Hackers Exploit RDP Servers to Deploy Stealthy Malware

State Hackers Exploit RDP Servers to Deploy Stealthy Malware

Posted on March 24, 2026 By CWS

A sophisticated state-backed hacking group, notorious for targeting critical sectors, is now focusing on Remote Desktop Protocol (RDP) servers. This group, identified as APT-C-13 and also known by names such as Sandworm and APT44, has been active in cyber espionage operations since 2009. Their latest campaign signifies a strategic move towards long-term infiltration aimed at intelligence gathering.

Change in Strategy: From Destruction to Infiltration

APT-C-13 has shifted its approach from immediate disruption to sustained espionage. This campaign uses a deceptive ISO image named Microsoft.Office.2025×64.v2025.iso, distributed on Telegram and other platforms, primarily targeting users in Ukraine. Upon mounting the image, unsuspecting users trigger hidden executables that begin the infection process.

By exploiting the trust associated with familiar software names, these executables install a loader that profiles the victim’s system, preparing it for further malicious payloads. Weixin’s 360 Threat Intelligence Center has confirmed that APT-C-13 is utilizing a modular framework known as the Tambur/Sumbur/Kalambur series.

Technical Details and Impact

The campaign’s impact is profound, using legitimate Windows tools such as PowerShell and SSH to remain undetected by conventional antivirus software. This strategic patience allows the attackers to extract sensitive information over months. The group achieves persistence through scheduled tasks that mimic legitimate Windows components, maintaining constant access via the RDP service.

Further control is established using the Kalambur and Sumbur modules, which channel command-and-control traffic through the Tor network, concealing the attackers’ locations. SSH reverse tunneling allows remote access to infected systems, while Sumbur integrates seamlessly with Windows processes, further obfuscating its presence.

Recommendations for Mitigation

The DemiMur module exacerbates the threat by injecting a forged root certificate, causing Windows to trust all malicious payloads. This, combined with disabling Microsoft Defender protections, renders the system vulnerable. To counteract this, organizations should block unauthorized ISO images and activation tools, and monitor internal network activities for anomalies.

Ensuring endpoint security is up-to-date and conducting regular scans are crucial steps. Additionally, institutions should enhance auditing practices and establish detection rules for unusual RDP and SSH activity, mitigating the risk of long-term data breaches.

Stay informed about the latest updates by following us on Google News, LinkedIn, and X. Set CSN as your preferred source on Google for timely cybersecurity news.

Cyber Security News Tags:APT-C-13, APT44, cyber defense, Cybersecurity, intelligence operations, Malware, network security, persistent threats, RDP, remote desktop, Sandworm, Seashell Blizzard, state-backed hacking, Voodoo Bear

Post navigation

Previous Post: Webinar Explores Practical Use of CIS Controls
Next Post: Key Insights from Gartner’s Guardian Agents Guide

Related Posts

Global Authorities Share IoCs and TTPs of Scattered Spider Behind Major ESXi Ransomware Attacks Global Authorities Share IoCs and TTPs of Scattered Spider Behind Major ESXi Ransomware Attacks Cyber Security News
Spring Framework Security Flaws Enable Authorization Bypass and Annotation Detection Issues Spring Framework Security Flaws Enable Authorization Bypass and Annotation Detection Issues Cyber Security News
New 0-Click Vulnerability Threatens Claude Desktop Users New 0-Click Vulnerability Threatens Claude Desktop Users Cyber Security News
CISA Warns of WhatsApp 0-Day Vulnerability Exploited in Attacks CISA Warns of WhatsApp 0-Day Vulnerability Exploited in Attacks Cyber Security News
X-VPN’s August Update Lets Mobile Users Choose Servers in 26 Regions with Military-grade AES-256 Encryption X-VPN’s August Update Lets Mobile Users Choose Servers in 26 Regions with Military-grade AES-256 Encryption Cyber Security News
Hackers use Fake Cloudflare Verification Screen to Trick Users into Executing Malware Hackers use Fake Cloudflare Verification Screen to Trick Users into Executing Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • MS-SQL Servers Under Persistent Threat by ICE Cloud Scanner
  • TeamPCP’s Kubernetes Wiper Escalates Threat in Iran
  • Resilient Tycoon2FA Phishing Platform Bounces Back Rapidly
  • Poland Sees Spike in Cyberattacks Targeting Energy Sector
  • Critical Dell Wyse Security Flaws Threaten Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • MS-SQL Servers Under Persistent Threat by ICE Cloud Scanner
  • TeamPCP’s Kubernetes Wiper Escalates Threat in Iran
  • Resilient Tycoon2FA Phishing Platform Bounces Back Rapidly
  • Poland Sees Spike in Cyberattacks Targeting Energy Sector
  • Critical Dell Wyse Security Flaws Threaten Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark