Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

RedNovember Hackers Attacking Government and Technology Organizations to Deploy Backdoor

Posted on September 26, 2025September 26, 2025 By CWS

In mid-2024, cybersecurity professionals started observing a surge of focused intrusions towards authorities, protection, and know-how organizations worldwide.

These incidents have been linked to a beforehand uncharacterized risk group later christened RedNovember, which leverages open-source and commodity instruments to deploy a stealthy Go-based backdoor.

Preliminary compromises typically stemmed from the exploitation of Web-facing units—together with VPN home equipment, load balancers, and webmail portals—utilizing publicly obtainable proof-of-concept exploits.

Subsequent post-exploitation actions usually concerned the deployment of the Pantegana command-and-control (C2) framework alongside variants of Cobalt Strike and SparkRAT, permitting operators to keep up long-term entry and execute espionage actions undetected.

Recorded Future analysts recognized RedNovember’s exercise following a July 2025 reconnaissance wave focusing on Ivanti Join Safe VPN home equipment throughout a number of areas.

Throughout this marketing campaign, operators scanned dozens of presidency ministries and personal sector entities, then delivered a malicious Go loader masquerading as a official software program replace.

Victims ranged from overseas affairs directorates in Southeast Asia to protection contractors in the US, underscoring the group’s strategic concentrate on high-value targets.

The usage of available exploits comparable to CVE-2024-3400 for Palo Alto GlobalProtect and CVE-2024-24919 for Test Level VPN gateways exemplifies RedNovember’s choice for fast, high-volume preliminary entry over bespoke malware growth.

Observers have famous that the group’s operations accelerated within the wake of geopolitical occasions.

As an illustration, reconnaissance towards Taiwanese analysis amenities coincided with Chinese language navy workouts within the Taiwan Strait, and intensive Panamanian authorities focusing on adopted high-level U.S. diplomatic visits.

Overview of RedNovember operations (Supply – Recorded Future)

The correlation between RedNovember exercise and diplomatic or navy actions suggests a state-sponsored intelligence motive, with the group harnessing open-source instruments to obfuscate attribution and cut back operational prices.

This tactic magnifies the danger of widespread exploitation, as adversaries can rapidly weaponize newly launched proof-of-concept code with out intensive growth overhead.

An infection Mechanism

A important element of RedNovember’s toolkit is LESLIELOADER, a Go-based loader that authenticates and decrypts its payload earlier than executing it in reminiscence.

The loader is distributed through spear-phishing emails containing a PDF lure doc. Upon execution, LESLIELOADER performs an AES decryption routine to unpack SparkRAT or Cobalt Strike Beacon modules.

A simplified YARA rule from Recorded Future’s Appendix D illustrates this decryption habits:-

rule MALLESLIELOADER {
meta:
creator = “Insikt Group, Recorded Future”
description = “Detects LESLIELOADER Malware utilized by RedNovember”
strings:
$s1 = “.DecrptogAES”
$s2 = “.UnPaddingText1”
situation:
uint16(0) == 0x4D5A and all of ($s*)
}

As soon as deployed, the loader contacts a hardcoded area (e.g., obtain.offiec.us.kg) over HTTP, retrieves the encrypted payload, and drops it into a brief listing.

The AES keys—embedded inside the binary—are used to decrypt the payload immediately into reminiscence, bypassing disk writes and evading conventional antivirus engines.

Following payload execution, the backdoor establishes persistence by making a Home windows registry Run key beneath HKCUSoftwareMicrosoftWindowsCurrentVersionRun and disabling occasion log options to hamper forensic auditing.

This mix of in-memory execution, encrypted payload supply, and log manipulation allows RedNovember to keep up covert footholds for prolonged intervals, granting operators the flexibility to exfiltrate delicate information and carry out lateral motion with minimal detection threat.

Regardless of the sophistication of those ways, defenders can disrupt RedNovember’s operations by monitoring for recognized C2 domains, imposing strict patch administration on perimeter units, and using behavior-based detection able to figuring out in-memory loaders.

Steady community segmentation and enhanced visibility on external-facing home equipment stay essential for mitigating this persistent risk.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attacking, Backdoor, Deploy, Government, Hackers, Organizations, RedNovember, Technology

Post navigation

Previous Post: New Phishing Attack Targeting PyPI Maintainers to Steal Login Credentials
Next Post: Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware

Related Posts

MastaStealer Weaponizes Windows LNK Files, Executes PowerShell Command, and Evades Defender Cyber Security News
Formbricks Signature Verification Vulnerability Let Attackers Reset User Passwords Without Authorization Cyber Security News
Lazarus Hackers Deploying Three RATs on Compromised Systems Possibly Using 0-Day Vulnerability Cyber Security News
INE Named to Training Industry’s 2025 Top 20 Online Learning Library List Cyber Security News
Payroll Pirates – Network of Criminal Groups Hijacking Payroll Systems Cyber Security News
Data-Leak Sites Hit an All-Time High With New Scattered Spider RaaS and LockBit 5.0 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark