Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries

Posted on September 4, 2025September 4, 2025 By CWS

Sep 04, 2025Ravie LakshmananCybersecurity / Malware

The Russian state-sponsored hacking group tracked as APT28 has been attributed to a brand new Microsoft Outlook backdoor known as NotDoor in assaults concentrating on a number of firms from totally different sectors in NATO member international locations.
NotDoor “is a VBA macro for Outlook designed to observe incoming emails for a selected set off phrase,” S2 Grupo’s LAB52 menace intelligence staff mentioned. “When such an e mail is detected, it permits an attacker to exfiltrate knowledge, add information, and execute instructions on the sufferer’s laptop.”
The artifact will get its identify from the usage of the phrase “Nothing” inside the supply code, the Spanish cybersecurity firm added. The exercise highlights the abuse of Outlook as a stealthy communication, knowledge exfiltration, and malware supply channel.
The precise preliminary entry vector used to ship the malware is presently not recognized, however evaluation exhibits that it is deployed by way of Microsoft’s OneDrive executable (“onedrive.exe”) utilizing a way known as DLL side-loading.
This results in the execution of a malicious DLL (“SSPICLI.dll”), which then installs the VBA backdoor and disables macro safety protections.

Particularly, it runs Base64-encoded PowerShell instructions to carry out a collection of actions that contain beaconing to an attacker-controlled webhook[.]web site, establishing persistence via Registry modifications, enabling macro execution, and turning off Outlook-related dialogue messages to evade detection.
NotDoor is designed as an obfuscated Visible Fundamental for Purposes (VBA) venture for Outlook that makes use of the Software.MAPILogonComplete and Software.NewMailEx occasions to run the payload each time Outlook is began or a brand new e mail arrives.
It then proceeds to create a folder on the path %TEMPpercentTemp if it doesn’t exist, utilizing it as a staging folder to retailer TXT information created in the course of the course of the operation and exfiltrate them to a Proton Mail handle. It additionally parses incoming messages for a set off string, resembling “Every day Report,” inflicting it to extract the embedded instructions to be executed.
The malware helps 4 totally different instructions –

cmd, to execute instructions and return the usual output as an e mail attachment
cmdno, to execute instructions
dwn, to exfiltrate information from the sufferer’s laptop by sending them as e mail attachments
upl, to drop information to the sufferer’s laptop

“Recordsdata exfiltrated by the malware are saved within the folder,” LAB52 mentioned. “The file contents are encoded utilizing the malware’s customized encryption, despatched by way of e mail, after which deleted from the system.”
The disclosure comes as Beijing-based 360 Risk Intelligence Heart detailed Gamaredon’s (aka APT-C-53) evolving tradecraft, highlighting its use of Telegram-owned Telegraph as a dead-drop resolver to level to command-and-control (C2) infrastructure.
The assaults are additionally notable for the abuse of Microsoft Dev Tunnels (devtunnels.ms), a service that permits builders to securely expose native net companies to the web for testing and debugging functions, as C2 domains for added stealth.
“This system supplies twofold benefits: first, the unique C2 server IP is totally masked by Microsoft’s relay nodes, blocking menace intelligence tracebacks based mostly on IP popularity,” the cybersecurity firm mentioned.

“Second, by exploiting the service’s means to reset domains on a minute-by-minute foundation, the attackers can quickly rotate infrastructure nodes, leveraging the trusted credentials and visitors scale of mainstream cloud companies to keep up an almost zero-exposure steady menace operation.”
Assault chains entail the usage of bogus Cloudflare Employees domains to distribute a Visible Fundamental Script like PteroLNK, which may propagate the an infection to different machines by copying itself to linked USB drives, in addition to obtain extra
payloads.
“This assault chain demonstrates a excessive degree of specialised design, using 4 layers of obfuscation (registry persistence, dynamic compilation, path masquerading, cloud service abuse) to hold out a completely covert operation from preliminary implantation to knowledge exfiltration,” 360 Risk Intelligence Heart mentioned.

The Hacker News Tags:APT28, Backdoor, Companies, Countries, Deploys, NATO, NotDoor, Outlook, Russian

Post navigation

Previous Post: GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module
Next Post: Chess.com Data Breach – Hackers Breached External Systems and Gained Internal Access

Related Posts

6,500 Axis Servers Expose Remoting Protocol, 4,000 in U.S. Vulnerable to Exploits The Hacker News
6 Steps to 24/7 In-House SOC Success The Hacker News
WinRAR Zero-Day Under Active Exploitation – Update to Latest Version Immediately The Hacker News
Why CTEM is the Winning Bet for CISOs in 2025 The Hacker News
AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs The Hacker News
Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chess.com Data Breach – Hackers Breached External Systems and Gained Internal Access
  • Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries
  • GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module
  • Tycoon Phishing Kit Employs New Technique to Hide Malicious Links
  • Apple Seeks Researchers for 2026 iPhone Security Program

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chess.com Data Breach – Hackers Breached External Systems and Gained Internal Access
  • Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries
  • GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module
  • Tycoon Phishing Kit Employs New Technique to Hide Malicious Links
  • Apple Seeks Researchers for 2026 iPhone Security Program

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News