Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Storm-2603 Using Custom Malware That Leverages BYOVD to Tamper with Endpoint Protections

Posted on August 2, 2025August 2, 2025 By CWS

A newly recognized risk actor designated Storm-2603 has emerged as a classy adversary within the ransomware panorama, leveraging superior customized malware to bypass endpoint safety protections by means of progressive methods.

The group first gained consideration throughout Microsoft’s investigation into the “ToolShell” marketing campaign, which exploited a number of SharePoint Server vulnerabilities together with CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, and CVE-2025-53771.

In contrast to established Chinese language APT teams reminiscent of Linen Hurricane and Violet Hurricane that had been additionally concerned in these assaults, Storm-2603 represents a beforehand undocumented cluster with distinct operational traits.

The risk actor’s arsenal facilities round a customized Command and Management framework internally dubbed “ak47c2,” which demonstrates exceptional technical sophistication by means of its dual-client structure.

This framework incorporates each HTTP-based communication channels, designated “ak47http,” and DNS-based tunneling capabilities known as “ak47dns.”

The malware’s design displays cautious consideration for operational safety and persistence, permitting attackers to keep up command and management even when conventional community monitoring methods are in place.

Occasions related to Storm-2603 (Supply – Verify Level)

Verify Level researchers recognized that Storm-2603’s operations have prolonged past the preliminary SharePoint exploitations, with proof suggesting the group focused organizations throughout Latin America and the Asia-Pacific area all through the primary half of 2025.

The group’s methodology includes deploying a number of ransomware households concurrently, together with LockBit Black and Warlock variants, usually using DLL hijacking methods for deployment and execution.

BYOVD Implementation and Endpoint Safety Bypass

Probably the most notable side of Storm-2603’s technical arsenal is their customized “Antivirus Terminator” instrument, which exemplifies the Carry Your Personal Susceptible Driver (BYOVD) method for disabling endpoint protections.

MSI Multi-Ransomware Deployment (Supply – Verify Level)

This refined utility requires administrative privileges and leverages a authentic, digitally signed driver initially developed by Antiy Labs as a part of their System In-Depth Evaluation Toolkit.

The instrument creates a service known as “ServiceMouse” that hundreds the weak driver ServiceMouse.sys, which is definitely a renamed model of AToolsKrn164.sys.

The malware communicates with this driver utilizing particular IO management codes, significantly 0x99000050 for course of termination, 0x990000D0 for file deletion, and 0x990001D0 for driver unloading operations.

if (DeviceIoControl (hDevice, 0x99000050, &InBuffer, 4u, OutBuffer, 4u, BytesReturned, 0))
{
printf_0(“kill okay :%s rn”, v1);
}

This implementation permits the malware to terminate safety processes on the kernel stage, successfully neutralizing endpoint safety methods earlier than deploying ransomware payloads.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:BYOVD, Custom, Endpoint, Leverages, Malware, Protections, Storm2603, Tamper

Post navigation

Previous Post: How to Safely Use AI Chatbots and Assistants
Next Post: Hackers Abuse Microsoft 365’s Direct Send Feature to Deliver Internal Phishing Attacks

Related Posts

11,000 Android Devices Hacked by Chinese Threats Actors to Deploy PlayPraetor Malware Cyber Security News
Hackers Actively Exploiting CitrixBleed 2 Vulnerability in the Wild Cyber Security News
CNCERT Accuses of US Intelligence Agencies Attacking Chinese Military-Industrial Units Cyber Security News
Healthcare Sector Emerges as a Prime Target for Cyber Attacks in 2025 Cyber Security News
Laundry Bear Infrastructure, Key Tactics and Procedures Uncovered Cyber Security News
Windows Authentication Coercion Attacks Pose Significant Threats to Enterprise Networks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Black Hat USA 2025 – Summary of Vendor Announcements (Part 1)
  • Vibe Coding: When Everyone’s a Developer, Who Secures the Code?
  • The Costly Confusion Behind Security Risks
  • How Top CISOs Save Their SOCs from Alert Chaos to Never Miss Real Incidents
  • Android’s August 2025 Update Patches Exploited Qualcomm Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Black Hat USA 2025 – Summary of Vendor Announcements (Part 1)
  • Vibe Coding: When Everyone’s a Developer, Who Secures the Code?
  • The Costly Confusion Behind Security Risks
  • How Top CISOs Save Their SOCs from Alert Chaos to Never Miss Real Incidents
  • Android’s August 2025 Update Patches Exploited Qualcomm Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News