Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus

Posted on September 24, 2025September 24, 2025 By CWS

Sep 24, 2025Ravie LakshmananMalware / Home windows Safety

Cybersecurity researchers have disclosed particulars of a brand new malware household dubbed YiBackdoor that has been discovered to share “vital” supply code overlaps with IcedID and Latrodectus.
“The precise connection to YiBackdoor isn’t but clear, however it could be used along side Latrodectus and IcedID throughout assaults,” Zscaler ThreatLabz mentioned in a Tuesday report. “YiBackdoor is ready to execute arbitrary instructions, gather system data, seize screenshots, and deploy plugins that dynamically increase the malware’s performance.”
The cybersecurity firm mentioned it first recognized the malware in June 2025, including it could be serving as a precursor to follow-on exploitation, akin to facilitating preliminary entry for ransomware assaults. Solely restricted deployments of YiBackdoor have been detected up to now, indicating it is at the moment both below improvement or being examined.

Given the similarities between YiBackdoor, IcedID, and Latrodectus, it is being assessed with medium to excessive confidence that the brand new malware is the work of the identical builders who’re behind the opposite two loaders. It is also value noting that Latrodectus, in itself, is believed to be a successor of IcedID.
YiBackdoor options rudimentary anti-analysis strategies to evade virtualized and sandboxed environments, whereas incorporating capabilities to inject the core performance into the “svchost.exe” course of. Persistence on the host is achieved through the use of the Home windows Run registry key.
“YiBackdoor first copies itself (the malware DLL) right into a newly created listing below a random identify,” the corporate mentioned. “Subsequent, YiBackdoor provides regsvr32.exe malicious_path within the registry worth identify (derived utilizing a pseudo-random algorithm) and self-deletes to hinder forensic evaluation.”
An embedded encrypted configuration throughout the malware is used to extract the command-and-control (C2) server, after which it establishes a connection to obtain instructions in HTTP responses –

Systeminfo, to gather system metadata
display screen, to take a screenshot
CMD, to execute a system shell command utilizing cmd.exe
PWS, to execute a system shell command utilizing PowerShell
plugin, to move a command to an present plugin and transmit the outcomes again to the server
job, to initialize and execute a brand new plugin that is Base64-encoded and encrypted

Zscaler’s evaluation of YiBackdoor has uncovered various code overlaps between YiBackdoor, IcedID, and Latrodectus, together with the code injection technique, the format and size of the configuration decryption key, and the decryption routines for the configuration blob and the plugins.
“YiBackdoor by default has considerably restricted performance, nevertheless, risk actors can deploy extra plugins that increase the malware’s capabilities,” Zscaler mentioned. “Given the restricted deployment up to now, it’s doubtless that risk actors are nonetheless creating or testing YiBackdoor.”
New Variations of ZLoader Noticed
The event comes because the cybersecurity agency examined two new variations of ZLoader (aka DELoader, Terdot, or Silent Evening) – 2.11.6.0 and a pair of.13.7.0 – that incorporate additional enhancements to its code obfuscation, community communications, anti-analysis strategies, and evasion capabilities.

Notable among the many modifications are LDAP-based community discovery instructions that may be leveraged for community discovery and lateral motion, in addition to an enhanced DNS-based community protocol that makes use of customized encryption with the choice of utilizing WebSockets.
Assaults distributing the malware loader are mentioned to be extra exact and focused, being deployed solely in opposition to a small variety of entities fairly than in an indiscriminate trend.
“ZLoader 2.13.7.0 contains enhancements and updates to the customized DNS tunnel protocol for command-and-control (C2) communications, together with added help for WebSockets,” Zscaler mentioned. “ZLoader continues to evolve its anti-analysis methods, leveraging revolutionary strategies to evade detection.”

The Hacker News Tags:Code, IcedID, Latrodectus, Major, Malware, Overlaps, Shares, YiBackdoor

Post navigation

Previous Post: The Blind Spot Fueling Payment Skimmer Attacks
Next Post: Weaponized Malwarebytes, LastPass, Citibank, SentinelOne, and Others on GitHub Deliver Malware

Related Posts

Samsung Fixes Critical Zero-Day CVE-2025-21043 Exploited in Android Attacks The Hacker News
Scattered Spider Hacker Gets 10 Years, $13M Restitution for SIM Swapping Crypto Theft The Hacker News
6,500 Axis Servers Expose Remoting Protocol, 4,000 in U.S. Vulnerable to Exploits The Hacker News
Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages The Hacker News
EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware The Hacker News
U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News