Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Malware Using Azure Functions For Hosting Command And Control Infrastructure

Posted on September 12, 2025September 12, 2025 By CWS

A brand new, refined malware marketing campaign has been uncovered that leverages Microsoft’s Azure Features for its command-and-control (C2) infrastructure, a novel approach that complicates detection and takedown efforts.

Based on the Dmpdump report, the malware, first recognized from a file uploaded to VirusTotal on August 28, 2025, from Malaysia, employs a multi-stage an infection course of involving DLL side-loading and in-memory payload execution to stay hidden.

The assault begins with a disk picture file named Servicenow-BNM-Confirm.iso. This ISO comprises 4 information: a reputable Palo Alto Networks executable (PanGpHip.exe), a shortcut file (servicenow-bnm-verify.lnk), and two hidden dynamic-link libraries (DLLs), libeay32.dll and the malicious libwaapi.dll.

virustotal an infection

When the consumer clicks the shortcut file, it executes the reputable PanGpHip.exe. Nevertheless, this executable is weak to DLL side-loading, inflicting it to load the malicious libwaapi.dll from the identical listing.

loading a malicious file

This method permits the malware to run below the guise of a trusted software, bypassing preliminary safety checks.

Metadata from the shortcut file reveals it was created on August 25, 2025, three days earlier than its add, on a machine named “desktop-rbg1pik” by a consumer “john.GIB,” providing a glimpse into the risk actor’s improvement setting.

Payload Injection And Obfuscation

As soon as loaded, the malicious libwaapi.dll initiates a posh payload injection sequence. It first hides its console window and creates a mutex to make sure just one occasion of the malware runs on the sufferer’s machine.

It then injects its important payload into the reminiscence of chakra.dll, a reputable Home windows element. This course of entails a number of layers of decryption and obfuscation.

The malware calculates an RC4 key by hashing the string “rdfY*&689uuaijs” and makes use of it to decrypt the payload. The injected payload is an obfuscated shellcode that decompresses the ultimate DLL implant utilizing the LZNT1 algorithm.

This closing payload is closely obfuscated, with evaluation suggesting it implements module unhooking to evade detection from safety software program.

Its performance is contained throughout the DllUnload exported perform, a much less widespread selection for housing malicious code.

export perform

Essentially the most vital facet of this malware is its use of Azure Features for C2 communications. The ultimate payload sends sufferer information through a POST request to logsapi.azurewebsites[.]web/api/logs.

By internet hosting its C2 on a reputable serverless platform like Azure, the malware makes it tough for community defenders to dam the malicious site visitors with out impacting entry to reputable Microsoft providers, in line with the Dmpdump report.

The exfiltrated information is shipped in an XML format, containing detailed details about the compromised system. This contains the pc and consumer names, OS model, system uptime, and the processes from which the malware and its mother or father course of are working.

A associated malware pattern with the identical import hash was uploaded from Singapore on September 5, 2025, suggesting the marketing campaign could also be extra widespread.

Safety researchers are persevering with to investigate the ultimate payload to know its full capabilities.

Discover this Story Attention-grabbing! Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates.

Cyber Security News Tags:Azure, Command, Control, Functions, Hosting, Infrastructure, Malware

Post navigation

Previous Post: Microsoft Windows Defender Firewall Vulnerabilities Let Attackers Escalate Privileges
Next Post: VMScape: Academics Break Cloud Isolation With New Spectre Attack

Related Posts

Threat Actors Abused AV – EDR Evasion Framework In-The-Wild to Deploy Malware Payloads Cyber Security News
NCSC Warns of ‘UMBRELLA STAND’ Malware Attacking Fortinet FortiGate Firewalls Cyber Security News
New Rust-based InfoStealer via Fake CAPTCHA Delivers EDDIESTEALER Cyber Security News
Wireshark 4.4.9 Released With Fix For Critical Bugs and Updated Protocol Support Cyber Security News
ShinyHunters Possibly Collaborates With Scattered Spider in Salesforce Attack Campaigns Cyber Security News
Critical Convoy Vulnerability Let Attackers Execute Remote Code on Affected Servers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT
  • What Are The Takeaways from The Scattered Lapsus $Hunters Statement?
  • ChatGPT’s New Support for MCP Tools Let Attackers Exfiltrate All Private Details From Email
  • How to Use Threat Intelligence Feeds
  • Sidewinder Hacker Group Weaponizing LNK File to Execute Malicious Scripts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT
  • What Are The Takeaways from The Scattered Lapsus $Hunters Statement?
  • ChatGPT’s New Support for MCP Tools Let Attackers Exfiltrate All Private Details From Email
  • How to Use Threat Intelligence Feeds
  • Sidewinder Hacker Group Weaponizing LNK File to Execute Malicious Scripts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News