Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Storm-2603 Using Custom Malware That Leverages BYOVD to Tamper with Endpoint Protections

Storm-2603 Using Custom Malware That Leverages BYOVD to Tamper with Endpoint Protections

Posted on August 2, 2025August 2, 2025 By CWS

A newly recognized risk actor designated Storm-2603 has emerged as a classy adversary within the ransomware panorama, leveraging superior customized malware to bypass endpoint safety protections by means of progressive methods.

The group first gained consideration throughout Microsoft’s investigation into the “ToolShell” marketing campaign, which exploited a number of SharePoint Server vulnerabilities together with CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, and CVE-2025-53771.

In contrast to established Chinese language APT teams reminiscent of Linen Hurricane and Violet Hurricane that had been additionally concerned in these assaults, Storm-2603 represents a beforehand undocumented cluster with distinct operational traits.

The risk actor’s arsenal facilities round a customized Command and Management framework internally dubbed “ak47c2,” which demonstrates exceptional technical sophistication by means of its dual-client structure.

This framework incorporates each HTTP-based communication channels, designated “ak47http,” and DNS-based tunneling capabilities known as “ak47dns.”

The malware’s design displays cautious consideration for operational safety and persistence, permitting attackers to keep up command and management even when conventional community monitoring methods are in place.

Occasions related to Storm-2603 (Supply – Verify Level)

Verify Level researchers recognized that Storm-2603’s operations have prolonged past the preliminary SharePoint exploitations, with proof suggesting the group focused organizations throughout Latin America and the Asia-Pacific area all through the primary half of 2025.

The group’s methodology includes deploying a number of ransomware households concurrently, together with LockBit Black and Warlock variants, usually using DLL hijacking methods for deployment and execution.

BYOVD Implementation and Endpoint Safety Bypass

Probably the most notable side of Storm-2603’s technical arsenal is their customized “Antivirus Terminator” instrument, which exemplifies the Carry Your Personal Susceptible Driver (BYOVD) method for disabling endpoint protections.

MSI Multi-Ransomware Deployment (Supply – Verify Level)

This refined utility requires administrative privileges and leverages a authentic, digitally signed driver initially developed by Antiy Labs as a part of their System In-Depth Evaluation Toolkit.

The instrument creates a service known as “ServiceMouse” that hundreds the weak driver ServiceMouse.sys, which is definitely a renamed model of AToolsKrn164.sys.

The malware communicates with this driver utilizing particular IO management codes, significantly 0x99000050 for course of termination, 0x990000D0 for file deletion, and 0x990001D0 for driver unloading operations.

if (DeviceIoControl (hDevice, 0x99000050, &InBuffer, 4u, OutBuffer, 4u, BytesReturned, 0))
{
printf_0(“kill okay :%s rn”, v1);
}

This implementation permits the malware to terminate safety processes on the kernel stage, successfully neutralizing endpoint safety methods earlier than deploying ransomware payloads.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:BYOVD, Custom, Endpoint, Leverages, Malware, Protections, Storm2603, Tamper

Post navigation

Previous Post: How to Safely Use AI Chatbots and Assistants
Next Post: Hackers Abuse Microsoft 365’s Direct Send Feature to Deliver Internal Phishing Attacks

Related Posts

Malware Operators Collaborate With Covert North Korean IT Workers to Attack Corporate Organizations Malware Operators Collaborate With Covert North Korean IT Workers to Attack Corporate Organizations Cyber Security News
Web DDoS, App Exploitation Attacks Saw a Huge Surge in First Half of 2025 Web DDoS, App Exploitation Attacks Saw a Huge Surge in First Half of 2025 Cyber Security News
New Variant of The XCSSET Malware Attacking macOS App Developers New Variant of The XCSSET Malware Attacking macOS App Developers Cyber Security News
Windows 11 PCs Fail to Shut Down After January Security Update Windows 11 PCs Fail to Shut Down After January Security Update Cyber Security News
Cloudflare Confirms Recent 1.1.1.1 DNS Outage Caused by BGP Attack or Hijack Cloudflare Confirms Recent 1.1.1.1 DNS Outage Caused by BGP Attack or Hijack Cyber Security News
Mustang Panda With SnakeDisk USB Worm and Toneshell Backdoor Seeking to Penetrate Air-Gap Systems Mustang Panda With SnakeDisk USB Worm and Toneshell Backdoor Seeking to Penetrate Air-Gap Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical n8n Vulnerability Allows System Commands Execution
  • DNS TXT Records Exploited in Advanced Cyber Attacks
  • NGINX Vulnerability Exploited in Web Traffic Hijacking
  • New Malvertising Threat Exploits Facebook Ads for Scams
  • Critical TP-Link Vulnerabilities Demand Immediate Firmware Updates

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical n8n Vulnerability Allows System Commands Execution
  • DNS TXT Records Exploited in Advanced Cyber Attacks
  • NGINX Vulnerability Exploited in Web Traffic Hijacking
  • New Malvertising Threat Exploits Facebook Ads for Scams
  • Critical TP-Link Vulnerabilities Demand Immediate Firmware Updates

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark