Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023

Posted on January 27, 2026January 27, 2026 By CWS

Ravie LakshmananJan 27, 2026Web Safety / Malware
Cybersecurity researchers have found a JScript-based command-and-control (C2) framework known as PeckBirdy that has been put to make use of by China-aligned APT actors since 2023 to focus on a number of environments.
The versatile framework has been put to make use of in opposition to Chinese language playing industries and malicious actions concentrating on Asian authorities entities and personal organizations, based on Development Micro.
“PeckBirdy is a script-based framework which, whereas possessing superior capabilities, is applied utilizing JScript, an previous script language,” researchers Ted Lee and Joseph C Chen mentioned. “That is to make sure that the framework may very well be launched throughout totally different execution environments through LOLBins (living-off-the-land binaries).”
The cybersecurity firm mentioned it recognized the PeckBirdy script framework in 2023 after it noticed a number of Chinese language playing web sites being injected with malicious scripts, that are designed to obtain and execute the first payload as a way to facilitate the distant supply and execution of JavaScript.
The tip purpose of this routine is to serve pretend software program replace internet pages for Google Chrome in order to trick customers into downloading and working bogus replace recordsdata, thereby infecting the machines with malware within the course of. This exercise cluster is being tracked as SHADOW-VOID-044.

SHADOW-VOID-044 is likely one of the two short-term intrusion units detected utilizing PeckBirdy. The second marketing campaign, noticed first in July 2024 and known as SHADOW-EARTH-045, entails concentrating on Asian authorities entities and personal organizations — together with a Philippine academic establishment — injecting PeckBirdy hyperlinks into authorities web sites to doubtless serve scripts for credential harvesting on the web site.
“In a single case, the injection was on a login web page of a authorities system, whereas in one other incident, we seen the attacker utilizing MSHTA to execute PeckBirdy as a distant entry channel for lateral motion in a personal group,” Development Micro mentioned. “The risk actor behind the assaults additionally developed a .NET executable to launch PeckBirdy with ScriptControl. These findings display the flexibility of PeckBirdy’s design, which permits it to serve a number of functions.”

What makes PeckBirdy notable is its flexibility, permitting it to run with various capabilities throughout internet browsers, MSHTA, WScript, Traditional ASP, Node JS, and .NET (ScriptControl). The framework’s server is configured to assist a number of APIs that make it attainable for shoppers to acquire touchdown scripts for various environments through an HTTP(S) question.
The API paths embody an “ATTACK ID” worth — a random however predefined string with 32 characters (e.g., o246jgpi6k2wjke000aaimwбe7571uh7) — that determines the PeckBirdy script to be retrieved from the area. As soon as launched, the PeckBirdy determines the present execution context after which proceeds to generate a singular sufferer ID and persist it for subsequent executions.
The initialization step is adopted by the framework trying to determine what communication strategies are supported within the setting. PeckBirdy makes use of the WebSocket protocol to speak with the server by default. Nonetheless, it will possibly additionally make use of Adobe Flash ActiveX objects or Comet as a fallback mechanism.

After a connection has been initiated with the distant server, passing alongside the ATTACK ID and sufferer ID values, the server responds with a second-stage script, one in every of which is able to stealing web site cookies. One in all PeckBirdy’s servers related to the SHADOW-VOID-044 marketing campaign has been discovered to host extra scripts –

An exploitation script for a Google Chrome flaw within the V8 engine (CVE-2020-16040, CVSS rating: 6.5) that was patched in December 2020
Scripts for social engineering pop-ups which can be designed to trick victims into downloading and executing malicious recordsdata
Scripts for delivering backdoors which can be executed through Electron JS
Scripts to determine reverse shells through TCP sockets

Additional infrastructure evaluation has led to the identification of two backdoors dubbed HOLODONUT and MKDOOR –

HOLODONUT, a .NET-based modular backdoor that is launched utilizing a easy downloader named NEXLOAD and is able to loading, working, or eradicating totally different plugins acquired from the server
MKDOOR, a modular backdoor that is able to loading, working, or uninstalling totally different modules acquired from the server

It is suspected that SHADOW-VOID-044 and SHADOW-EARTH-045 may very well be linked to totally different China-aligned nation-state actors. This evaluation is predicated on the next clues –

The presence of GRAYRABBIT, a backdoor beforehand deployed by UNC3569 alongside DRAFTGRAPH and Crosswalk following the exploitation of N-day safety flaws, on a server operated by SHADOW-VOID-044
HOLODONUT is alleged to share hyperlinks to a different backdoor, WizardNet, which is attributed to TheWizards
A Cobalt Strike artifact hosted on the SHADOW-VOID-044 server that is signed utilizing a certificates that was additionally utilized in a 2021 BIOPASS RAT marketing campaign geared toward on-line playing firms in China through a watering gap assault
Similarities between BIOPASS RAT and MKDOOR, each of which open an HTTP server on a high-numbered port on the native host to hear (The BIOPASS RAT is attributed to a risk actor generally known as Earth Lusca, aka Aquatic Panda or RedHotel)
SHADOW-EARTH-045’s use of 47.238.184[.]9 – an IP handle beforehand linked to Earth Baxia and APT41 – to downloaded recordsdata

“These campaigns make use of a dynamic JavaScript framework, PickBirdy, to abuse living-off-the-land binaries and ship modular backdoors comparable to MKDOOR and HOLODONUT,” Development Micro concluded. “Detecting malicious JavaScript frameworks stays a big problem as a result of their use of dynamically generated, runtime-injected code and the absence of persistent file artifacts, enabling them to evade conventional endpoint safety controls.”

The Hacker News Tags:ChinaLinked, Framework, Hackers, JavaScript, PeckBirdy

Post navigation

Previous Post: Critical Vulnerability in Python PLY Library Enables Remote Code Execution
Next Post: Caminho Loader-as-a-Service Using Steganography to Conceal .NET Payloads within Image Files

Related Posts

FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing The Hacker News
Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord The Hacker News
Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign The Hacker News
SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances The Hacker News
What Should We Learn From How Attackers Leveraged AI in 2025? The Hacker News
Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Attackers Exploiting React2Shell Vulnerability to Attack IT Sectors
  • Memcyco Raises $37 Million for Anti-Impersonation Technology
  • Your Tier 1 Analyst at SOC Team Is Failing at Effective Triage
  • Over 100 Organizations Targeted in ShinyHunters Phishing Campaign
  • ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Attackers Exploiting React2Shell Vulnerability to Attack IT Sectors
  • Memcyco Raises $37 Million for Anti-Impersonation Technology
  • Your Tier 1 Analyst at SOC Team Is Failing at Effective Triage
  • Over 100 Organizations Targeted in ShinyHunters Phishing Campaign
  • ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark