Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Nimbus Manticore Attacking Defense and Telecom Sectors With New Malware

Posted on September 23, 2025September 23, 2025 By CWS

The Iranian menace actor often known as Nimbus Manticore has intensified its marketing campaign focusing on protection manufacturing, telecommunications, and aviation sectors throughout Western Europe with subtle new malware variants.

This mature superior persistent menace group, additionally tracked as UNC1549 and Smoke Sandstorm, has advanced its ways to incorporate beforehand undocumented methods for evading detection and sustaining persistence on compromised methods.

Nimbus Manticore’s current operations exhibit a strategic shift towards European targets, significantly in Denmark, Sweden, and Portugal.

The menace actor has refined its social engineering strategy by impersonating legit aerospace giants together with Boeing, Airbus, and Rheinmetall, in addition to telecommunications corporations like flydubai.

Their misleading profession portal web sites make the most of React-based templates that intently mimic genuine hiring platforms, full with pre-shared credentials for every focused sufferer.

The assault methodology begins with tailor-made spear-phishing campaigns the place alleged HR recruiters direct victims to pretend profession portals.

Every goal receives distinctive URLs and login credentials, enabling the menace actors to trace sufferer engagement and keep managed entry all through the an infection course of.

This strategy demonstrates subtle operational safety measures and credible pretexting capabilities that align with nation-state tradecraft.

Examine Level analysts recognized the malware’s deployment via an intricate multi-stage an infection chain that exploits legit Home windows processes.

An infection chain (Supply – Examine Level)

The preliminary payload, disguised as hiring-related software program resembling “Survey.zip,” comprises a number of elements together with a legit Setup.exe file that initiates the sideloading sequence.

The malware leverages a Home windows Defender element referred to as SenseSampleUploader.exe to execute its payload via DLL hijacking methods.

Multi-Stage DLL Sideloading Mechanism

The an infection chain employs a novel method that manipulates the Home windows DLL search order via undocumented low-level APIs.

When the sufferer executes Setup.exe, the malware makes use of RtlCreateProcessParameters to switch the DllPath parameter within the RTL_USER_PROCESS_PARAMETERS construction.

This manipulation allows the malicious xmllite.dll to be loaded from the archive listing fairly than the anticipated system location.

The contents of malicious ZIP archive (Supply – Examine Level)

The userenv.dll element checks the executing course of identify to find out the an infection stage. Throughout preliminary setup, it makes use of low-level ntdll API calls to launch the Home windows Defender binary positioned at C:Program FilesWindows Defender Superior Menace ProtectionSenseSampleUploader.exe.

The malware exploits this legit executable’s vulnerability to DLL hijacking, forcing it to load the malicious xmllite.dll from the identical folder because the archive.

As soon as loaded, the xmllite.dll creates a working listing at %AppDatapercentLocalMicrosoftMigAutoPlay and copies the backdoor elements for persistence.

The malware establishes a scheduled job to execute MigAutoPlay.exe, which then sideloads the malicious userenv.dll containing the first backdoor performance.

This method successfully bypasses conventional safety controls by leveraging trusted Home windows processes.

The evolution of the malware, now tracked as MiniJunk, incorporates substantial compiler-level obfuscation methods that render samples almost irreversible for normal static evaluation.

The menace actors have applied customized LLVM passes that introduce junk code insertion, control-flow obfuscation, opaque predicates, and encrypted strings. Every string receives particular person encryption with distinctive keys, whereas operate calls bear arithmetic operations to obscure their precise locations.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attacking, Defense, Malware, Manticore, Nimbus, Sectors, Telecom

Post navigation

Previous Post: SolarWinds Makes Third Attempt at Patching Exploited Vulnerability
Next Post: Eurojust Arrests 5 in €100M Cryptocurrency Investment Fraud Spanning 23 Countries

Related Posts

New eSIM Hack Let Attackers Clone Profiles and Hijack Phone Identities Cyber Security News
Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code Cyber Security News
Chrome Type Confusion 0-Day Vulnerability Code Analysis Released Cyber Security News
Hackers Can Exfiltrate Windows Secrets and Credentials Silently by Evading EDR Detection Cyber Security News
Threat Actor Allegedly Selling FortiGate API Exploit Tool Targeting FortiOS Cyber Security News
Report Reveals Tool Overload Driving Fatigue and Missed Threats in MSPs Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Beware of Fake Online Speedtest Application With Obfuscated JS Codes
  • Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security
  • Patch Bypassed for Supermicro Vulnerability Allowing BMC Hack
  • Defy Security Appoints Esteemed Cybersecurity Leader Gary Warzala to Its Board of Directors
  • Eurojust Arrests 5 in €100M Cryptocurrency Investment Fraud Spanning 23 Countries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Beware of Fake Online Speedtest Application With Obfuscated JS Codes
  • Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security
  • Patch Bypassed for Supermicro Vulnerability Allowing BMC Hack
  • Defy Security Appoints Esteemed Cybersecurity Leader Gary Warzala to Its Board of Directors
  • Eurojust Arrests 5 in €100M Cryptocurrency Investment Fraud Spanning 23 Countries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News