Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

APT-Grade PDFSider Malware Used by Ransomware Groups

Posted on January 20, 2026January 20, 2026 By CWS

A newly recognized malware household with superior capabilities is being utilized in focused assaults, together with by a number of ransomware teams, Resecurity stories.

Dubbed PDFSider, the risk was designed to deploy a backdoor with encrypted command-and-control (C&C) capabilities and supply attackers with performance usually related to APTs, corresponding to cyberespionage and distant code execution (RCE).

The risk gives an interactive, hidden shell for command execution, and makes use of the Botan cryptographic library for authenticated encryption, exfiltrating command output by way of the encrypted communication channel.

PDFSider is sideloaded by way of the reputable PDF24 Creator utility, which is delivered to victims in a ZIP archive connected to spear-phishing emails. Working primarily in reminiscence, the malware units up communication, harvests system data, and begins the backdoor loop.

Resecurity says PDFSider was utilized in an assault in opposition to a Fortune 100 company, wherein the attackers used social engineering and QuickAssist to achieve distant entry.

Nevertheless, a number of ransomware teams are already utilizing it in assaults as a payload supply methodology, the cybersecurity agency notes.Commercial. Scroll to proceed studying.

A multi-stage setting validation routine permits PDFSider to detect digital environments and evaluation instruments, which make it engaging to cybercriminals.

It additionally consists of AV/EDR evasion, and the usage of DLL sideloading for supply additionally helps risk actors evade detection. In actual fact, Resecurity notes, each APTs and cybercriminals seem to have favored this code execution approach in latest assaults, and up to date stories from Acronis and Trellix verify it.

A well-liked approach for safety options bypass and code execution on Home windows methods, DLL sideloading depends on abusing a weak, reputable utility to load malicious DLLs and obtain persistence or escalate privileges.

APT and cybercrime teams abusing DLL sideloading

The China-linked APT Mustang Panda, Acronis stories, has used DLL sideloading in a latest marketing campaign concentrating on US authorities and policy-related entities within the context of the US-Venezuela battle.

The state-sponsored espionage group has relied on spear-phishing emails to ship a ZIP archive containing a reputable executable and a hidden DLL designed to be sideloaded for the execution of a customized C++ backdoor named LotusElite.

The backdoor can spawn a shell to allow distant code execution (RCE) and the retrieval of command output in actual time. Primarily based on obtained instructions, LotusElite can enumerate, create, and modify information.

The implant, Acronis notes, seems for use as a staging or beaconing server, because the attackers have been seen connecting a number of instances to the contaminated endpoints.

Using DLL sideloading in recent Mustang Panda assaults, nevertheless, is no surprise, because the APT is understood for using the approach for payload execution and detection evasion.

Final week, Trellix detailed the abuse of the reputable Ahost.exe utility, a element of the open supply C-ares library, for DLL sideloading in assaults involving commodity malware corresponding to data stealers and distant entry trojans (RATs).

Possible counting on phishing and utilizing localized filenames in Arabic, English, Farsi, Portuguese, and Spanish, the attackers abused DLL sideloading to contaminate victims with malware households corresponding to AgentTesla, FormBook, Lumma Stealer, Vidar, CryptBot, Remcos, QuasarRAT, DCRat, and XWorm.

Associated: Chinese language Cyberspies Deploy ‘BadAudio’ Malware by way of Provide Chain Assaults

Associated: Chinese language APT Exploits Unpatched Home windows Flaw in Latest Assaults

Associated: Russian Espionage Group Utilizing Ransomware in Assaults

Associated: Vietnamese Hackers Distribute Malware by way of Faux AI-Themed Web sites

Security Week News Tags:APTGrade, Groups, Malware, PDFSIDER, Ransomware

Post navigation

Previous Post: The Hidden Risk of Orphan Accounts
Next Post: Open Source Firewall OPNsense 25.7.11 Released With Host Discovery Service

Related Posts

Gabbard Says UK Scraps Demand for Apple to Give Backdoor Access to Data Security Week News
New ‘Broadside’ Botnet Poses Risk to Shipping Companies Security Week News
A Massive Telecom Threat Was Stopped Right As World Leaders Gathered at UN Headquarters in New York Security Week News
Chinese Hackers Breached Law Firm Williams & Connolly via Zero-Day Security Week News
CISA Adds Exploited XWiki, VMware Flaws to KEV Catalog Security Week News
Gambling Tech Firm Bragg Discloses Cyberattack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chainlit Vulnerabilities May Leak Sensitive Information
  • Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution
  • Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading
  • TP-Link Vulnerability Allows Authentication Bypass Via Password Recovery Feature
  • Open Source Firewall OPNsense 25.7.11 Released With Host Discovery Service

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chainlit Vulnerabilities May Leak Sensitive Information
  • Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution
  • Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading
  • TP-Link Vulnerability Allows Authentication Bypass Via Password Recovery Feature
  • Open Source Firewall OPNsense 25.7.11 Released With Host Discovery Service

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark