Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
APT Hackers Exploited Windows WebDAV 0-Day RCE Vulnerability in the Wild to Deploy Malware

APT Hackers Exploited Windows WebDAV 0-Day RCE Vulnerability in the Wild to Deploy Malware

Posted on June 10, 2025June 10, 2025 By CWS

A complicated cyberattack marketing campaign by the superior persistent risk group, Stealth Falcon, which exploited a beforehand unknown zero-day vulnerability to focus on a significant Turkish protection firm and execute malware remotely.

The assault leveraged CVE-2025-33053, a distant code execution vulnerability that permits risk actors to govern the working listing of reputable Home windows instruments to execute malicious recordsdata from attacker-controlled WebDAV servers.

Microsoft launched a safety patch for this vulnerability as a part of its June Patch Tuesday updates, following a accountable disclosure by Test Level Analysis.

The vulnerability was exploited by way of a malicious .url file named “TLM.005_TELESKOPIK_MAST_HASAR_BILDIRIM_RAPORU.pdf.url” (Turkish for “TLM.005 TELESCOPIC MAST DAMAGE REPORT.pdf.url”), which was doubtless distributed as an archived attachment in a spear-phishing e-mail focusing on the Turkish protection contractor.

The .url file pointed to iediagcmd.exe, a reputable Web Explorer diagnostics utility, however manipulated the working listing to reference an attacker-controlled WebDAV server at “summerartcamp[.]internet@ssl@443/DavWWWRootOSYxaOjr”.

This intelligent method exploited the search order utilized by the .NET Course of.Begin() technique, inflicting the reputable device to execute malicious recordsdata from the distant server as an alternative of system recordsdata.

This allowed arbitrary code execution by way of course of hollowing, because the malicious route.exe spawned from the WebDAV server, bypassed conventional signature-based defenses.

Certificates for a Malicious file (Supply: Test Level)

APT Hackers Exploited WebDAV Zero-Day

Stealth Falcon, often known as FruityArmor, is a sophisticated persistent risk group that has been conducting cyber espionage operations since at the very least 2012.

The group primarily targets high-profile entities within the Center East and Africa, with current operations noticed towards authorities and protection sectors in Turkey, Qatar, Egypt, and Yemen.

An infection chain (Supply: Test Level)

The assault delivered a multi-stage an infection chain, culminating within the deployment of “Horus Agent,” a custom-built implant for the Mythic command and management framework, in response to Test Level Analysis.

Named after the Egyptian falcon-headed sky god, Horus Agent represents an evolution from the group’s beforehand used personalized Apollo implant. The malware employs superior anti-analysis strategies, together with code virtualization, string encryption, and API hashing, to evade detection.

Past the preliminary implant, researchers recognized a number of beforehand undisclosed {custom} instruments in Stealth Falcon’s arsenal, together with a DC Credential Dumper that bypasses file locks by accessing digital disk copies, a passive backdoor that listens for incoming shellcode execution requests, and a {custom} keylogger with RC4 encryption.

The Horus Agent focuses on important reconnaissance features, permitting risk actors to fingerprint sufferer machines and assess their worth earlier than deploying extra superior payloads. This method helps defend the group’s refined post-exploitation instruments from publicity.

Stealth Falcon constantly makes use of repurposed reputable domains bought by way of NameCheap registrar, usually in .internet or .com top-level domains. This technique helps their infrastructure mix in with reputable site visitors, complicating attribution efforts.

The group’s continued evolution demonstrates its dedication to sustaining stealth and resilience in its operations, using business code obfuscation instruments and {custom} modifications that make its payloads tough to reverse-engineer and observe over time.

This newest marketing campaign highlights the continuing risk posed by refined APT teams, which mix zero-day exploits with revolutionary assault vectors, akin to WebDAV manipulation, to focus on important infrastructure and protection organizations worldwide.

Automate risk response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs throughout all endpoints -> Request full entry

Cyber Security News Tags:0Day, APT, Deploy, Exploited, Hackers, Malware, RCE, Vulnerability, WebDAV, Wild, Windows

Post navigation

Previous Post: Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gaps
Next Post: Code Execution Flaws Haunt Adobe Acrobat Reader, Adobe Commerce

Related Posts

New Cyber Attack Weaponizes DeskSoft to Deploy Malware Leveraging RDP Access to Execute Commands New Cyber Attack Weaponizes DeskSoft to Deploy Malware Leveraging RDP Access to Execute Commands Cyber Security News
New Study Shows GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale New Study Shows GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale Cyber Security News
CISA Releases Guidance for Managing UEFI Secure Boot on Enterprise Devices CISA Releases Guidance for Managing UEFI Secure Boot on Enterprise Devices Cyber Security News
Salty2FA and Tycoon2FA Phishing Kits Attacking Enterprise Users to Steal Login Credentials Salty2FA and Tycoon2FA Phishing Kits Attacking Enterprise Users to Steal Login Credentials Cyber Security News
Snake Keyloggers Abuse Java Utilities to Evade Security Tools Snake Keyloggers Abuse Java Utilities to Evade Security Tools Cyber Security News
New EDRStartupHinder Tool blocks antivirus and EDR services at startup on Windows 11 25H2 Defender New EDRStartupHinder Tool blocks antivirus and EDR services at startup on Windows 11 25H2 Defender Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News