Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SquidLoader Using Sophisticated Malware With Near-Zero Detection to Swim Under Radar

SquidLoader Using Sophisticated Malware With Near-Zero Detection to Swim Under Radar

Posted on July 16, 2025July 17, 2025 By CWS

Hong Kong’s monetary sector is contending with a recent surge of SquidLoader samples that glide previous typical defenses with virtually no antivirus flags.

First noticed in early July 2025, the loader arrives via rigorously worded spear-phishing emails written in Simplified Chinese language and bearing password-protected RAR attachments masquerading as respectable bond-registration paperwork.

As soon as the consumer extracts the archive and double-clicks what seems to be a Microsoft Phrase icon, execution pivots to a malicious PE file designed to resemble AMD’s AMDRSServ.exe, silently laying the groundwork for compromise.

Inside that counterfeit executable, management is secretly hijacked within the CRT epilogue lengthy earlier than WinMain() is reached, permitting SquidLoader to unpack itself and light-weight up its multi-stage an infection chain.

Trellix analysts famous that this primary stage merely iterates via 78,469 packed bytes, making use of an XOR 0xF4 operation and including 19 to every worth to disclose the loader’s true code.

for(size_t i = 0; i

With the payload decrypted, Stage 2 walks the Course of Surroundings Block to find ntdll.dll and kernel32.dll, dynamically resolves scores of APIs, and shops their addresses—plus thread, PEB, and TEB metadata—in a customized stack construction whose pointer is hidden inside unused PEB reminiscence.

This tactical sleight of hand eradicates static strings and thwarts signature-based hunters.

Trellix researchers recognized SquidLoader’s last goal because the in-memory launch of a Cobalt Strike Beacon that studies to shifting Kubernetes-themed endpoints akin to 39.107.156.136 /api/v1/namespaces/kube-system/companies earlier than handing off to a secondary beacon host at 182.92.239.24.

For victims, the result’s covert distant entry that blends seamlessly with regular HTTPS site visitors whereas safety groups stay blind to the breach.

Detection Evasion Ways

The loader’s most ingenious tips revolve round exhaustive anti-analysis routines that frustrate sandboxing and stay debugging alike.

Early in Stage 3, SquidLoader invokes NtQuerySystemInformation with the undocumented SystemKernelDebuggerInformation selector; any non-zero return code alerts a kernel debugger and triggers self-destruct.

It then enumerates working processes by way of SystemProcessInformation, blacklisting a laundry checklist of debuggers—from Olldbg.exe to x64dbg.exe—together with widespread AV brokers akin to MsMpEng.exe and kav.exe; detection of any goal once more prompts fast termination.

A very thorny thread/APC trick spins up a employee thread that sleeps for 1,000,000 ms, queues an APC to itself, and waits, emulators that speed up Sleep() or mishandle APC supply return sudden NTSTATUS values, inflicting the malware to exit earlier than analysts can connect.

Lastly, a Mandarin-language message field—“The file is corrupted and can’t be opened”—calls for consumer interplay, a easy but efficient option to bypass automated sandboxes that lack GUI management.

Collectively, these layers be sure that by the point incident responders understand a beacon is looking dwelling, SquidLoader has already slipped beneath the sonar and out to sea.

Examine stay malware conduct, hint each step of an assault, and make sooner, smarter safety choices -> Attempt ANY.RUN now

Cyber Security News Tags:Detection, Malware, NearZero, Radar, Sophisticated, SquidLoader, Swim

Post navigation

Previous Post: Windows Server 2025 Golden dMSA Attack Enables Authentication Bypass and Password Generation
Next Post: United Natural Foods Projects Up to $400M Sales Hit from June Cyberattack

Related Posts

Printer Company Offered Malicious Drivers Infected With XRed Malware Printer Company Offered Malicious Drivers Infected With XRed Malware Cyber Security News
Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment Cyber Security News
New Punishing Owl Hacker Group Targeting Networks of Russian Government Security Agency New Punishing Owl Hacker Group Targeting Networks of Russian Government Security Agency Cyber Security News
How Winning SOCs Always Stay Ahead of Threats  How Winning SOCs Always Stay Ahead of Threats  Cyber Security News
Critical WordPress Plugin Vulnerability Exposes 70,000+ Sites to RCE Attacks Critical WordPress Plugin Vulnerability Exposes 70,000+ Sites to RCE Attacks Cyber Security News
Hackers Using CastleRAT Malware to Attack Windows Systems and Gain Remote Access Hackers Using CastleRAT Malware to Attack Windows Systems and Gain Remote Access Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News