Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

xHunt APT Hackers Attacking Microsoft Exchange and IIS Web Servers to Deploy Custom Backdoors

Posted on December 15, 2025December 15, 2025 By CWS

The xHunt superior persistent menace group has firmly established itself as a complicated cyber-espionage actor, orchestrating focused campaigns in opposition to organizations in Kuwait.

Since its emergence in 2018, the group has targeted intently on the federal government, transport, and transportation sectors.

Their operations are characterised by means of a customized and evolving toolkit, with many instruments bearing names derived from the Hunter x Hunter anime collection.

This distinctive naming conference accompanies a persistent drive to infiltrate vital infrastructure and harvest delicate intelligence by bespoke malware variants like Hisoka and Netero.

Assault vectors employed by xHunt are various, usually starting with strategic watering gap assaults or the direct compromise of web-facing Microsoft Alternate and IIS servers.

One significantly novel approach entails injecting hidden HTML tags into compromised authorities web sites, redirecting guests to actor-controlled servers to reap NTLM hashes.

This passive credential theft permits the attackers to achieve unauthorized entry with out speedy detection, using the collected knowledge to compromise additional programs throughout the community.

The influence of those intrusions is profound, because the group deploys a set of customized backdoors to take care of long-term entry.

Picus Safety analysts recognized the malware after observing these distinctive behaviors, noting the group’s functionality to mix into official community site visitors.

Instruments such because the BumbleBee webshell and PowerShell-based backdoors like TriFive and Snugy enable the attackers to execute arbitrary instructions.

By leveraging Alternate Internet Companies for command and management, the attackers talk by way of electronic mail drafts throughout the Deleted Objects folder, additional complicating detection efforts.

Persistence and Protection Evasion Mechanisms

A vital facet of xHunt’s methodology is their reliance on scheduled duties to make sure the persistence of their PowerShell backdoors. As soon as a system is compromised, the attackers set up duties that execute malicious scripts at exact intervals, usually each jiffy.

These duties are meticulously crafted to evade detection by mimicking official Home windows processes and inserting recordsdata in trusted directories.

As an example, the group makes use of particular instructions to schedule their payloads:-

schtasks /create /sc MINUTE /mo 5 /tn “MicrosoftWindowsSideShowSystemDataProvider” /tr “powershell -exec bypass -file C:WindowsTempxpsrchvw.ps1” /ru SYSTEM

This command establishes a activity disguised as a SystemDataProvider, working with excessive privileges to execute the Snugy backdoor.

Moreover, xHunt actors make use of masquerading methods, corresponding to inserting duties within the Home windows Diagnostic Infrastructure listing and naming them ResolutionHosts to resemble official system recordsdata.

These evasion techniques, mixed with their use of SSH tunnels for lateral motion, make xHunt a resilient and elusive menace that requires complete behavioral monitoring to detect successfully.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:APT, Attacking, Backdoors, Custom, Deploy, Exchange, Hackers, IIS, Microsoft, Servers, Web, xHunt

Post navigation

Previous Post: Jaguar Land Rover Confirms Employee Data Stolen in August Cyberattack
Next Post: Militant Groups Are Experimenting With AI, and the Risks Are Expected to Grow

Related Posts

Microsoft Eliminated High-Privilege Access to Enhance Microsoft 365 Security Cyber Security News
Threat Actors Using ViperSoftX Malware to Exfiltrate Sensitive Details Cyber Security News
New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT Cyber Security News
Hackers Leverage Hexstrike-AI Tool to Exploit Zero Day Vulnerabilities Within 10 Minutes Cyber Security News
Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers Cyber Security News
Scattered LAPSUS$ Hunters 4.0 Announced That Their Going Dark Permanently Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ZnDoor Malware Exploiting React2Shell Vulnerability to Compromise Network Devices
  • Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats
  • New PCPcat Exploiting React2Shell Vulnerability to compromise 59,000+ Servers
  • Militant Groups Are Experimenting With AI, and the Risks Are Expected to Grow
  • xHunt APT Hackers Attacking Microsoft Exchange and IIS Web Servers to Deploy Custom Backdoors

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ZnDoor Malware Exploiting React2Shell Vulnerability to Compromise Network Devices
  • Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats
  • New PCPcat Exploiting React2Shell Vulnerability to compromise 59,000+ Servers
  • Militant Groups Are Experimenting With AI, and the Risks Are Expected to Grow
  • xHunt APT Hackers Attacking Microsoft Exchange and IIS Web Servers to Deploy Custom Backdoors

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark