Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

APT Hackers Exploited Windows WebDAV 0-Day RCE Vulnerability in the Wild to Deploy Malware

Posted on June 10, 2025June 10, 2025 By CWS

A complicated cyberattack marketing campaign by the superior persistent risk group, Stealth Falcon, which exploited a beforehand unknown zero-day vulnerability to focus on a significant Turkish protection firm and execute malware remotely.

The assault leveraged CVE-2025-33053, a distant code execution vulnerability that permits risk actors to govern the working listing of reputable Home windows instruments to execute malicious recordsdata from attacker-controlled WebDAV servers.

Microsoft launched a safety patch for this vulnerability as a part of its June Patch Tuesday updates, following a accountable disclosure by Test Level Analysis.

The vulnerability was exploited by way of a malicious .url file named “TLM.005_TELESKOPIK_MAST_HASAR_BILDIRIM_RAPORU.pdf.url” (Turkish for “TLM.005 TELESCOPIC MAST DAMAGE REPORT.pdf.url”), which was doubtless distributed as an archived attachment in a spear-phishing e-mail focusing on the Turkish protection contractor.

The .url file pointed to iediagcmd.exe, a reputable Web Explorer diagnostics utility, however manipulated the working listing to reference an attacker-controlled WebDAV server at “summerartcamp[.]internet@ssl@443/DavWWWRootOSYxaOjr”.

This intelligent method exploited the search order utilized by the .NET Course of.Begin() technique, inflicting the reputable device to execute malicious recordsdata from the distant server as an alternative of system recordsdata.

This allowed arbitrary code execution by way of course of hollowing, because the malicious route.exe spawned from the WebDAV server, bypassed conventional signature-based defenses.

Certificates for a Malicious file (Supply: Test Level)

APT Hackers Exploited WebDAV Zero-Day

Stealth Falcon, often known as FruityArmor, is a sophisticated persistent risk group that has been conducting cyber espionage operations since at the very least 2012.

The group primarily targets high-profile entities within the Center East and Africa, with current operations noticed towards authorities and protection sectors in Turkey, Qatar, Egypt, and Yemen.

An infection chain (Supply: Test Level)

The assault delivered a multi-stage an infection chain, culminating within the deployment of “Horus Agent,” a custom-built implant for the Mythic command and management framework, in response to Test Level Analysis.

Named after the Egyptian falcon-headed sky god, Horus Agent represents an evolution from the group’s beforehand used personalized Apollo implant. The malware employs superior anti-analysis strategies, together with code virtualization, string encryption, and API hashing, to evade detection.

Past the preliminary implant, researchers recognized a number of beforehand undisclosed {custom} instruments in Stealth Falcon’s arsenal, together with a DC Credential Dumper that bypasses file locks by accessing digital disk copies, a passive backdoor that listens for incoming shellcode execution requests, and a {custom} keylogger with RC4 encryption.

The Horus Agent focuses on important reconnaissance features, permitting risk actors to fingerprint sufferer machines and assess their worth earlier than deploying extra superior payloads. This method helps defend the group’s refined post-exploitation instruments from publicity.

Stealth Falcon constantly makes use of repurposed reputable domains bought by way of NameCheap registrar, usually in .internet or .com top-level domains. This technique helps their infrastructure mix in with reputable site visitors, complicating attribution efforts.

The group’s continued evolution demonstrates its dedication to sustaining stealth and resilience in its operations, using business code obfuscation instruments and {custom} modifications that make its payloads tough to reverse-engineer and observe over time.

This newest marketing campaign highlights the continuing risk posed by refined APT teams, which mix zero-day exploits with revolutionary assault vectors, akin to WebDAV manipulation, to focus on important infrastructure and protection organizations worldwide.

Automate risk response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs throughout all endpoints -> Request full entry

Cyber Security News Tags:0Day, APT, Deploy, Exploited, Hackers, Malware, RCE, Vulnerability, WebDAV, Wild, Windows

Post navigation

Previous Post: Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gaps
Next Post: Code Execution Flaws Haunt Adobe Acrobat Reader, Adobe Commerce

Related Posts

Critical Sophos Firewall Vulnerabilities Enables pre-auth Remote Code Execution Cyber Security News
PyPI Warns of New Phishing Attack Targeting Developers With Fake PyPI site Cyber Security News
Authorities Arrested 17 Criminal Bankers, EUR 4.5 Million Seized Cyber Security News
PoC Exploit Released for Critical WebDAV 0-Day RCE Vulnerability Exploited by APT Hackers Cyber Security News
Windows DWM 0-Day Vulnerability Allows Attackers to Escalate Privileges Cyber Security News
Jenkins Gatling Plugin Vulnerability Let Attackers Bypass Content-Security-Policy Protection Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Respond to a Sextortion Threat
  • Senate Committee Advances Trump Nominee to Lead CISA
  • ToxicPanda Android Banking Malware Infected 4500+ Devices to Steal Banking Credentials
  • New XWorm V6 Variant’s With Anti-Analysis Capabilities Attacking Windows Users in The Wild
  • Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Respond to a Sextortion Threat
  • Senate Committee Advances Trump Nominee to Lead CISA
  • ToxicPanda Android Banking Malware Infected 4500+ Devices to Steal Banking Credentials
  • New XWorm V6 Variant’s With Anti-Analysis Capabilities Attacking Windows Users in The Wild
  • Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News