Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chinese Hackers Target Azerbaijani Energy Firm via Microsoft Exchange

Chinese Hackers Target Azerbaijani Energy Firm via Microsoft Exchange

Posted on May 13, 2026 By CWS

A prominent cyber attack linked to Chinese hackers has been reported against an Azerbaijani oil and gas company, marking a significant breach between December 2025 and February 2026. The attack, attributed to the hacking group FamousSparrow, involved multiple waves of intrusion targeting the company’s Microsoft Exchange Server.

Details of the Cyber Attack

The Romanian cybersecurity firm Bitdefender, with moderate-to-high confidence, has identified FamousSparrow as the group responsible for the attack. This group is known for its overlap with other cyber clusters such as Earth Estries and Salt Typhoon. The attack involved the deployment of two distinct backdoors: Deed RAT and TernDoor, across three separate waves. These tools are known for their use in cyber espionage, with Deed RAT being a successor to the notorious ShadowPad malware.

Exploitation of Microsoft Exchange

The attackers repeatedly exploited a vulnerability in Microsoft Exchange Server, using the ProxyNotShell chain to gain initial access. Despite several remediation efforts, the hackers persisted, deploying Deed RAT in December 2025, switching to TernDoor in early 2026, and returning with a modified Deed RAT in late February. Bitdefender’s report highlights Azerbaijan’s increasing importance in European energy security as a potential motivation for the attack.

Advanced Techniques and Persistence

After gaining access, the attackers sought to establish a persistent presence by deploying web shells and using evolved DLL side-loading techniques. This method involved the LogMeIn Hamachi binary to execute the rogue DLL, enhancing traditional defense evasion strategies. The attackers also attempted lateral movement within the network, ensuring they maintained access even if initial breaches were detected.

In February 2026, the threat actors made another attempt, deploying a modified version of Deed RAT with connections to “sentinelonepro [.]com” for command-and-control operations. This ongoing intrusion reflects a sophisticated and determined effort to exploit vulnerabilities and maintain access.

Future Implications and Security Measures

The Azerbaijani firm’s repeated targeting underscores the persistent nature of cyber threats from nation-state actors. The attack illustrates the necessity for organizations to patch vulnerabilities promptly, rotate compromised credentials, and implement comprehensive security measures to thwart such persistent threats. As Azerbaijan plays a crucial role in regional energy security, the implications of such breaches could extend beyond the company, potentially affecting broader geopolitical dynamics.

The Hacker News Tags:Azerbaijani energy, Bitdefender, Chinese hackers, cyber attacks, cyber espionage, Cybersecurity, Deed RAT, DLL side-loading, energy security, FamousSparrow, Malware, Microsoft Exchange, Mofu Loader, ProxyNotShell, TernDoor

Post navigation

Previous Post: Critical Outlook Vulnerability Poses Serious Risk to Enterprises
Next Post: Sweet Security’s AI Red Teaming Boosts Cyber Defense

Related Posts

New Brazilian Malware Targets Financial Platforms New Brazilian Malware Targets Financial Platforms The Hacker News
Wiz Uncovers Critical Access Bypass Flaw in AI-Powered Vibe Coding Platform Base44 Wiz Uncovers Critical Access Bypass Flaw in AI-Powered Vibe Coding Platform Base44 The Hacker News
Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more The Hacker News
Secure AI at Scale and Speed — Learn the Framework in this Free Webinar Secure AI at Scale and Speed — Learn the Framework in this Free Webinar The Hacker News
Why CTEM is the Winning Bet for CISOs in 2025 Why CTEM is the Winning Bet for CISOs in 2025 The Hacker News
Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Enhancing Phishing Detection with SOCs and MSSPs
  • Sweet Security’s AI Red Teaming Boosts Cyber Defense
  • Chinese Hackers Target Azerbaijani Energy Firm via Microsoft Exchange
  • Critical Outlook Vulnerability Poses Serious Risk to Enterprises
  • Microsoft’s AI MDASH System Detects 16 Windows Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Enhancing Phishing Detection with SOCs and MSSPs
  • Sweet Security’s AI Red Teaming Boosts Cyber Defense
  • Chinese Hackers Target Azerbaijani Energy Firm via Microsoft Exchange
  • Critical Outlook Vulnerability Poses Serious Risk to Enterprises
  • Microsoft’s AI MDASH System Detects 16 Windows Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark