Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chinese Hackers Using Custom ShadowPad IIS Listener Module to Turn Compromised Servers into Active Nodes

Chinese Hackers Using Custom ShadowPad IIS Listener Module to Turn Compromised Servers into Active Nodes

Posted on December 17, 2025December 17, 2025 By CWS

The group employs a customized ShadowPad IIS Listener module to remodel compromised servers right into a resilient, distributed relay community.

This method permits attackers to route malicious site visitors by sufferer infrastructure, successfully turning hacked organizations right into a mesh of command-and-control nodes.

The operation begins by exploiting long-standing vulnerabilities, particularly ASP.NET ViewState deserialization and SharePoint flaws equivalent to ToolShell.

By leveraging leaked machine keys or unpatched endpoints, attackers obtain distant code execution, resulting in full-system compromise.

As soon as established, the malware creates a covert channel that blends seamlessly with reputable net site visitors, making detection exceptionally tough for community defenders monitoring normal protocols.

Verify Level analysts recognized this evolving menace cluster, noting that the group—often known as Earth Alux or REF7707—has considerably refined its tradecraft.

The researchers noticed that Ink Dragon doesn’t merely use victims for information theft however actively repurposes them to assist ongoing operations in opposition to different targets.

Assault chain (Supply – Verify Level)

This creates a self-sustaining infrastructure that obscures the true origin of the assaults whereas maximizing the utility of each compromised asset.

This modular structure grants the attackers persistent entry and the flexibility to pivot laterally throughout networks.

Utilizing native IIS capabilities to intercept and relay communications ensures that command site visitors stays hidden inside normal HTTP streams.

This strategic reuse of compromised property highlights a mature operational philosophy targeted on long-term stealth, resilience, and the continual enlargement of their operational attain.

The ShadowPad IIS Listener Mechanism

The core of this marketing campaign is a customized IIS module that operates otherwise from conventional backdoors.

As an alternative of merely opening a port, it makes use of the HttpAddUrl API to register dynamic URL listeners that intercept particular HTTP requests.

When a request matches the configured sample, the module decrypts the payload to find out if it’s a command.

If the site visitors doesn’t match the proprietary protocol, the module forwards it to the reputable IIS employee, which serves regular net content material to keep away from elevating suspicion.

This stealthy interception permits the implant to coexist with reputable functions with out disrupting service availability.

Relay Community (Supply – Verify Level)

The module makes use of a particular decryption routine to deal with preliminary packets, guaranteeing that solely approved operator site visitors is processed.

def decrypt_first_packet(buf: bytearray, seed: int, size: int):
rely = size – 2
seed_lo = buf[0]
seed_hi = buf[1]
num = (seed_hi << 8) | seed_lo
num &= 0xFFFFFFFF

pos = 2
for _ in vary(rely):
hello = (num >> 16) & 0xFFFF
num = (hello * 0x7093915D – num * 0x6EA30000 + 0x06B0F0E3) & 0xFFFFFFFF
buf[pos] ^= num & 0xFF
pos += 1
return buf

By sustaining separate lists for server and consumer nodes, the malware routinely pairs connections to relay information between them.

This permits the attackers to bridge communications throughout unrelated sufferer networks, complicating attribution and remediation efforts.

This relay logic is supported by granular debug logging, which paperwork byte transfers and helps analysts map the broader communication graph.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Active, Chinese, Compromised, Custom, Hackers, IIS, Listener, Module, Nodes, Servers, ShadowPad, Turn

Post navigation

Previous Post: Singularity Linux Kernel Rootkit with New Feature Prevents Detection
Next Post: New $150 Cellik RAT Grants Android Control, Trojanizes Google Play Apps

Related Posts

Hackers Registered 2,000+ Fake Holiday-Themed Online Stores to Steal User Payments Hackers Registered 2,000+ Fake Holiday-Themed Online Stores to Steal User Payments Cyber Security News
Critical Zimbra SSRF Vulnerability Let Attackers Access Sensitive Data Critical Zimbra SSRF Vulnerability Let Attackers Access Sensitive Data Cyber Security News
ClickFix Malware Attacks macOS Users to Steal Login Credentials ClickFix Malware Attacks macOS Users to Steal Login Credentials Cyber Security News
Kimwolf Botnet Hacked 2 Million Devices and Turned User’s Internet Connection as Proxy Node Kimwolf Botnet Hacked 2 Million Devices and Turned User’s Internet Connection as Proxy Node Cyber Security News
Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website Cyber Security News
VexTrio TDS System Developing Several Malicious Apps Mimic as VPNs to Publish in Google Play and App Store VexTrio TDS System Developing Several Malicious Apps Mimic as VPNs to Publish in Google Play and App Store Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark