Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

RedNovember Hackers Attacking Government and Technology Organizations to Deploy Backdoor

Posted on September 26, 2025September 26, 2025 By CWS

In mid-2024, cybersecurity professionals started observing a surge of focused intrusions towards authorities, protection, and know-how organizations worldwide.

These incidents have been linked to a beforehand uncharacterized risk group later christened RedNovember, which leverages open-source and commodity instruments to deploy a stealthy Go-based backdoor.

Preliminary compromises typically stemmed from the exploitation of Web-facing units—together with VPN home equipment, load balancers, and webmail portals—utilizing publicly obtainable proof-of-concept exploits.

Subsequent post-exploitation actions usually concerned the deployment of the Pantegana command-and-control (C2) framework alongside variants of Cobalt Strike and SparkRAT, permitting operators to keep up long-term entry and execute espionage actions undetected.

Recorded Future analysts recognized RedNovember’s exercise following a July 2025 reconnaissance wave focusing on Ivanti Join Safe VPN home equipment throughout a number of areas.

Throughout this marketing campaign, operators scanned dozens of presidency ministries and personal sector entities, then delivered a malicious Go loader masquerading as a official software program replace.

Victims ranged from overseas affairs directorates in Southeast Asia to protection contractors in the US, underscoring the group’s strategic concentrate on high-value targets.

The usage of available exploits comparable to CVE-2024-3400 for Palo Alto GlobalProtect and CVE-2024-24919 for Test Level VPN gateways exemplifies RedNovember’s choice for fast, high-volume preliminary entry over bespoke malware growth.

Observers have famous that the group’s operations accelerated within the wake of geopolitical occasions.

As an illustration, reconnaissance towards Taiwanese analysis amenities coincided with Chinese language navy workouts within the Taiwan Strait, and intensive Panamanian authorities focusing on adopted high-level U.S. diplomatic visits.

Overview of RedNovember operations (Supply – Recorded Future)

The correlation between RedNovember exercise and diplomatic or navy actions suggests a state-sponsored intelligence motive, with the group harnessing open-source instruments to obfuscate attribution and cut back operational prices.

This tactic magnifies the danger of widespread exploitation, as adversaries can rapidly weaponize newly launched proof-of-concept code with out intensive growth overhead.

An infection Mechanism

A important element of RedNovember’s toolkit is LESLIELOADER, a Go-based loader that authenticates and decrypts its payload earlier than executing it in reminiscence.

The loader is distributed through spear-phishing emails containing a PDF lure doc. Upon execution, LESLIELOADER performs an AES decryption routine to unpack SparkRAT or Cobalt Strike Beacon modules.

A simplified YARA rule from Recorded Future’s Appendix D illustrates this decryption habits:-

rule MALLESLIELOADER {
meta:
creator = “Insikt Group, Recorded Future”
description = “Detects LESLIELOADER Malware utilized by RedNovember”
strings:
$s1 = “.DecrptogAES”
$s2 = “.UnPaddingText1”
situation:
uint16(0) == 0x4D5A and all of ($s*)
}

As soon as deployed, the loader contacts a hardcoded area (e.g., obtain.offiec.us.kg) over HTTP, retrieves the encrypted payload, and drops it into a brief listing.

The AES keys—embedded inside the binary—are used to decrypt the payload immediately into reminiscence, bypassing disk writes and evading conventional antivirus engines.

Following payload execution, the backdoor establishes persistence by making a Home windows registry Run key beneath HKCUSoftwareMicrosoftWindowsCurrentVersionRun and disabling occasion log options to hamper forensic auditing.

This mix of in-memory execution, encrypted payload supply, and log manipulation allows RedNovember to keep up covert footholds for prolonged intervals, granting operators the flexibility to exfiltrate delicate information and carry out lateral motion with minimal detection threat.

Regardless of the sophistication of those ways, defenders can disrupt RedNovember’s operations by monitoring for recognized C2 domains, imposing strict patch administration on perimeter units, and using behavior-based detection able to figuring out in-memory loaders.

Steady community segmentation and enhanced visibility on external-facing home equipment stay essential for mitigating this persistent risk.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attacking, Backdoor, Deploy, Government, Hackers, Organizations, RedNovember, Technology

Post navigation

Previous Post: New Phishing Attack Targeting PyPI Maintainers to Steal Login Credentials
Next Post: Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware

Related Posts

PLA Rapidly Deploys AI Technology Across Military Intelligence Operations Cyber Security News
Kibana Crowdstrike Connector Vulnerability Exposes Protected Credentials Cyber Security News
Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints Cyber Security News
Linux 6.17 Released With Fix for use-after-free Vulnerabilities Cyber Security News
Google Chrome May Soon Turn Webpages Into Podcasts With AI Audio Overviews Cyber Security News
PoC Exploit Released for Remotely Exploitable Oracle E-Business Suite 0-Day Vulnerability Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News