Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Storm-2603 Using Custom Malware That Leverages BYOVD to Tamper with Endpoint Protections

Posted on August 2, 2025August 2, 2025 By CWS

A newly recognized risk actor designated Storm-2603 has emerged as a classy adversary within the ransomware panorama, leveraging superior customized malware to bypass endpoint safety protections by means of progressive methods.

The group first gained consideration throughout Microsoft’s investigation into the “ToolShell” marketing campaign, which exploited a number of SharePoint Server vulnerabilities together with CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, and CVE-2025-53771.

In contrast to established Chinese language APT teams reminiscent of Linen Hurricane and Violet Hurricane that had been additionally concerned in these assaults, Storm-2603 represents a beforehand undocumented cluster with distinct operational traits.

The risk actor’s arsenal facilities round a customized Command and Management framework internally dubbed “ak47c2,” which demonstrates exceptional technical sophistication by means of its dual-client structure.

This framework incorporates each HTTP-based communication channels, designated “ak47http,” and DNS-based tunneling capabilities known as “ak47dns.”

The malware’s design displays cautious consideration for operational safety and persistence, permitting attackers to keep up command and management even when conventional community monitoring methods are in place.

Occasions related to Storm-2603 (Supply – Verify Level)

Verify Level researchers recognized that Storm-2603’s operations have prolonged past the preliminary SharePoint exploitations, with proof suggesting the group focused organizations throughout Latin America and the Asia-Pacific area all through the primary half of 2025.

The group’s methodology includes deploying a number of ransomware households concurrently, together with LockBit Black and Warlock variants, usually using DLL hijacking methods for deployment and execution.

BYOVD Implementation and Endpoint Safety Bypass

Probably the most notable side of Storm-2603’s technical arsenal is their customized “Antivirus Terminator” instrument, which exemplifies the Carry Your Personal Susceptible Driver (BYOVD) method for disabling endpoint protections.

MSI Multi-Ransomware Deployment (Supply – Verify Level)

This refined utility requires administrative privileges and leverages a authentic, digitally signed driver initially developed by Antiy Labs as a part of their System In-Depth Evaluation Toolkit.

The instrument creates a service known as “ServiceMouse” that hundreds the weak driver ServiceMouse.sys, which is definitely a renamed model of AToolsKrn164.sys.

The malware communicates with this driver utilizing particular IO management codes, significantly 0x99000050 for course of termination, 0x990000D0 for file deletion, and 0x990001D0 for driver unloading operations.

if (DeviceIoControl (hDevice, 0x99000050, &InBuffer, 4u, OutBuffer, 4u, BytesReturned, 0))
{
printf_0(“kill okay :%s rn”, v1);
}

This implementation permits the malware to terminate safety processes on the kernel stage, successfully neutralizing endpoint safety methods earlier than deploying ransomware payloads.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:BYOVD, Custom, Endpoint, Leverages, Malware, Protections, Storm2603, Tamper

Post navigation

Previous Post: How to Safely Use AI Chatbots and Assistants
Next Post: Hackers Abuse Microsoft 365’s Direct Send Feature to Deliver Internal Phishing Attacks

Related Posts

FBI Atlanta Seizes Major Video Game Piracy Websites in International Operation Cyber Security News
Windows User Account Control Bypassed Using Character Editor to Escalate Privileges Cyber Security News
Google Gemini for Workspace Vulnerability Lets Attackers Hide Malicious Scripts in Emails Cyber Security News
Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability Cyber Security News
SoundCloud Confirms Data Breach Following VPN and Access Issues Cyber Security News
New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Docker AI Attack, Google Sues Chinese Cybercriminals, Coupang Hacked by Employee
  • Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware
  • Cloud Atlas Hacker Group Exploiting Office Vulnerabilities to Execute Malicious Code
  • Denmark Blames Russia for Cyberattacks Ahead of Elections and on Water Utility
  • Scripted Sparrow Uses Automation to Generate and Send their Attack Messages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Docker AI Attack, Google Sues Chinese Cybercriminals, Coupang Hacked by Employee
  • Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware
  • Cloud Atlas Hacker Group Exploiting Office Vulnerabilities to Execute Malicious Code
  • Denmark Blames Russia for Cyberattacks Ahead of Elections and on Water Utility
  • Scripted Sparrow Uses Automation to Generate and Send their Attack Messages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark