Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments

Posted on July 15, 2025July 15, 2025 By CWS

Jul 15, 2025Ravie LakshmananCyber Espionage / Risk Intelligence
Governmental organizations in Southeast Asia are the goal of a brand new marketing campaign that goals to gather delicate info via a beforehand undocumented Home windows backdoor dubbed HazyBeacon.
The exercise is being tracked by Palo Alto Networks Unit 42 underneath the moniker CL-STA-1020, the place “CL” stands for “cluster” and “STA” refers to “state-backed motivation.”
“The risk actors behind this cluster of exercise have been accumulating delicate info from authorities companies, together with details about current tariffs and commerce disputes,” safety researcher Lior Rochberger mentioned in a Monday evaluation.Southeast Asia has more and more change into a focus for cyber espionage as a consequence of its position in delicate commerce negotiations, army modernization, and strategic alignment within the U.S.–China energy dynamic. Focusing on authorities companies on this area can present useful intelligence on overseas coverage course, infrastructure planning, and inside regulatory shifts that affect regional and international markets.

The precise preliminary entry vector used to ship the malware is at the moment not recognized, though proof reveals using DLL side-loading methods to deploy it on compromised hosts. Particularly, it entails planting a malicious model of a DLL referred to as “mscorsvc.dll” together with the professional Home windows executable, “mscorsvw.exe.”
As soon as the binary is launched, the DLL proceeds to ascertain communication with an attacker-controlled URL that enables it to execute arbitrary instructions and obtain extra payloads. Persistence is achieved via a service that ensures the DLL is launched even after a reboot of the system.
HazyBeacon is notable for the truth that it leverages Amazon Net Providers (AWS) Lambda URLs for command-and-control (C2) functions, demonstrating risk actors’ continued abuse of professional companies to fly underneath the radar and escape detection.

“AWS Lambda URLs are a function of AWS Lambda that enables customers to invoke serverless capabilities straight over HTTPS,” Rochberger defined. “This method makes use of professional cloud performance to cover in plain sight, making a dependable, scalable and difficult-to-detect communication channel.”Defenders ought to take note of outbound visitors to not often used cloud endpoints like *.lambda-url.*.amazonaws.com, particularly when initiated by uncommon binaries or system companies. Whereas AWS utilization itself is not suspicious, context-aware baselining—reminiscent of correlating course of origins, parent-child execution chains, and endpoint habits—may also help distinguish professional exercise from malware leveraging cloud-native evasion.
Downloaded among the many payloads is a file collector module that is chargeable for harvesting recordsdata matching a selected set of extensions (e.g., doc, docx, xls, xlsx, and pdf) and inside a time vary. This contains makes an attempt to seek for recordsdata associated to the current tariff measures imposed by the USA.

The risk actor has additionally been discovered to make use of different companies like Google Drive and Dropbox as exfiltration channels in order to mix in with regular community visitors and transmit the gathered information. Within the incident analyzed by Unit 42, makes an attempt to add the recordsdata to the cloud storage companies are mentioned to have been blocked.
Within the remaining stage, the attackers run cleanup instructions to keep away from leaving traces of their exercise, deleting all of the archives of staged recordsdata and different payloads downloaded throughout the assault.
“The risk actors used HazyBeacon as the primary instrument for sustaining a foothold and accumulating delicate info from the affected governmental entities,” Rochberger mentioned. “This marketing campaign highlights how attackers proceed to seek out new methods to abuse professional, trusted cloud companies.”HazyBeacon displays a broader pattern of superior persistent threats utilizing trusted platforms as covert channels—a tactic sometimes called “residing off trusted companies” (LOTS). As a part of this cloud-based malware cluster, comparable methods have been noticed in threats utilizing Google Workspace, Microsoft Groups, or Dropbox APIs to evade detection and facilitate persistent entry.

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Asian, AWS, Data, Governments, HazyBeacon, Lambda, Malware, StateBacked, Steal

Post navigation

Previous Post: How to Protect the Invisible Identity Access
Next Post: Data Breach at Debt Settlement Firm Impacts 160,000 People

Related Posts

Meta Adds Passkey Login Support to Facebook for Android and iOS Users The Hacker News
5 Lessons from River Island The Hacker News
The Unusual Suspect: Git Repos The Hacker News
Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery The Hacker News
Scattered Spider Behind Cyberattacks on M&S and Co-op, Causing Up to $592M in Damages The Hacker News
CISO’s Guide To Web Privacy Validation And Why It’s Important The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors
  • Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams
  • Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools
  • Konfety Android Malware on Google Play Uses ZIP Manipulation to Imitate Legitimate Apps
  • Virtual Event Preview: Cloud & Data Security Summit – Tackling Exposed Attack Surfaces in the Cloud

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors
  • Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams
  • Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools
  • Konfety Android Malware on Google Play Uses ZIP Manipulation to Imitate Legitimate Apps
  • Virtual Event Preview: Cloud & Data Security Summit – Tackling Exposed Attack Surfaces in the Cloud

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News