Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Malware Using Azure Functions For Hosting Command And Control Infrastructure

Posted on September 12, 2025September 12, 2025 By CWS

A brand new, refined malware marketing campaign has been uncovered that leverages Microsoft’s Azure Features for its command-and-control (C2) infrastructure, a novel approach that complicates detection and takedown efforts.

Based on the Dmpdump report, the malware, first recognized from a file uploaded to VirusTotal on August 28, 2025, from Malaysia, employs a multi-stage an infection course of involving DLL side-loading and in-memory payload execution to stay hidden.

The assault begins with a disk picture file named Servicenow-BNM-Confirm.iso. This ISO comprises 4 information: a reputable Palo Alto Networks executable (PanGpHip.exe), a shortcut file (servicenow-bnm-verify.lnk), and two hidden dynamic-link libraries (DLLs), libeay32.dll and the malicious libwaapi.dll.

virustotal an infection

When the consumer clicks the shortcut file, it executes the reputable PanGpHip.exe. Nevertheless, this executable is weak to DLL side-loading, inflicting it to load the malicious libwaapi.dll from the identical listing.

loading a malicious file

This method permits the malware to run below the guise of a trusted software, bypassing preliminary safety checks.

Metadata from the shortcut file reveals it was created on August 25, 2025, three days earlier than its add, on a machine named “desktop-rbg1pik” by a consumer “john.GIB,” providing a glimpse into the risk actor’s improvement setting.

Payload Injection And Obfuscation

As soon as loaded, the malicious libwaapi.dll initiates a posh payload injection sequence. It first hides its console window and creates a mutex to make sure just one occasion of the malware runs on the sufferer’s machine.

It then injects its important payload into the reminiscence of chakra.dll, a reputable Home windows element. This course of entails a number of layers of decryption and obfuscation.

The malware calculates an RC4 key by hashing the string “rdfY*&689uuaijs” and makes use of it to decrypt the payload. The injected payload is an obfuscated shellcode that decompresses the ultimate DLL implant utilizing the LZNT1 algorithm.

This closing payload is closely obfuscated, with evaluation suggesting it implements module unhooking to evade detection from safety software program.

Its performance is contained throughout the DllUnload exported perform, a much less widespread selection for housing malicious code.

export perform

Essentially the most vital facet of this malware is its use of Azure Features for C2 communications. The ultimate payload sends sufferer information through a POST request to logsapi.azurewebsites[.]web/api/logs.

By internet hosting its C2 on a reputable serverless platform like Azure, the malware makes it tough for community defenders to dam the malicious site visitors with out impacting entry to reputable Microsoft providers, in line with the Dmpdump report.

The exfiltrated information is shipped in an XML format, containing detailed details about the compromised system. This contains the pc and consumer names, OS model, system uptime, and the processes from which the malware and its mother or father course of are working.

A associated malware pattern with the identical import hash was uploaded from Singapore on September 5, 2025, suggesting the marketing campaign could also be extra widespread.

Safety researchers are persevering with to investigate the ultimate payload to know its full capabilities.

Discover this Story Attention-grabbing! Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates.

Cyber Security News Tags:Azure, Command, Control, Functions, Hosting, Infrastructure, Malware

Post navigation

Previous Post: Microsoft Windows Defender Firewall Vulnerabilities Let Attackers Escalate Privileges
Next Post: VMScape: Academics Break Cloud Isolation With New Spectre Attack

Related Posts

New LNK Malware Uses Windows Binaries to Bypass Security Tools and Execute Malware Cyber Security News
The Most Active RAT Uses New Stagers and Loaders to Bypass Defenses Cyber Security News
Microsoft Patch for Old Flaw Reveals New Kernel Address Leak Vulnerability in Windows 11/Server 2022 24H2 Cyber Security News
2 Chinese Hackers Trained Cisco Program Now Attacking Cisco Devices Cyber Security News
PoC Exploit Unveiled for Lenovo Code Execution Vulnerability Enabling Privilege Escalation Cyber Security News
CrowdStrike Falcon Windows Sensor Vulnerability Let Attackers Execute Code and Delete Files on Host Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Surge in Attacks Targeting RSC-Enabled Services Worldwide
  • In Other News: PromptPwnd Attack, Small macOS Bounties, Chinese Hackers Trained in Cisco Academy
  • New JSCEAL Infostealer Malware Attacking Windows Systems to Steal Login Credentials
  • New Research Details on What Happens to Data Stolen in a Phishing Attack
  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Surge in Attacks Targeting RSC-Enabled Services Worldwide
  • In Other News: PromptPwnd Attack, Small macOS Bounties, Chinese Hackers Trained in Cisco Academy
  • New JSCEAL Infostealer Malware Attacking Windows Systems to Steal Login Credentials
  • New Research Details on What Happens to Data Stolen in a Phishing Attack
  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark