Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Operation Hanoi Thief Attacking IT Professionals with Pseudo-Polyglot Payload to Hide Malware

Operation Hanoi Thief Attacking IT Professionals with Pseudo-Polyglot Payload to Hide Malware

Posted on December 1, 2025December 2, 2025 By CWS

A complicated cyberespionage marketing campaign dubbed “Operation Hanoi Thief” has surfaced, particularly focusing on IT professionals and recruitment groups in Vietnam.

Found on November 3, 2025, this menace exercise employs a fancy multi-stage an infection chain designed to reap delicate browser credentials and historical past.

The attackers leverage a malicious spear-phishing technique, distributing a ZIP archive named Le-Xuan-Son_CV.zip, which masquerades as a official job software from a software program developer primarily based in Hanoi.

The an infection initiates when a sufferer interacts with a shortcut file, CV.pdf.lnk, contained inside the archive. This file triggers a sequence of occasions using “Dwelling off the Land” (LOLBin) ways.

Particularly, it abuses the Home windows ftp.exe utility with the -s flag to execute a batch script hidden inside a pseudo-polyglot file named offsec-certified-professional.png.

This file dual-functions as a innocent picture lure and a malicious container, successfully evading conventional detection mechanisms by burying its payload inside official picture headers.

Knowledge Exfiltration (Supply – Seqrite)

This command line argument is a important indicator of the assault’s stealthy nature.

Seqrite safety analysts recognized that this marketing campaign is probably going of Chinese language origin, citing overlaps in ways with earlier state-sponsored actions.

The first goal seems to be intelligence gathering, specializing in the theft of login information and looking habits from victims within the know-how and HR sectors.

By exploiting the belief inherent in recruitment processes, the menace actors efficiently bypass preliminary perimeter safety layers.

Technical Evaluation of the LOTUSHARVEST Payload

The core of this assault is the execution of the LOTUSHARVEST implant. As soon as the preliminary script runs, it abuses DeviceCredentialDeployment.exe to hide its command-line actions and renames system utilities like certutil.exe to lala.exe to bypass monitoring.

Within the an infection chain, the script then extracts a base64-encoded blob from the polyglot file, decoding it right into a malicious DLL named MsCtfMonitor.dll.

An infection Chain (Supply – Seqrite)

This DLL is side-loaded utilizing a official ctfmon.exe binary copied to the C:ProgramData listing.

LOTUSHARVEST features as a sturdy info stealer, using anti-analysis checks like IsDebuggerPresent and IsProcessorFeaturePresent to crash if analyzed.

It targets Google Chrome and Microsoft Edge, querying SQLite databases to extract the highest 20 visited URLs and decrypting as much as 5 saved credentials utilizing CryptUnprotectData.

Lastly, the stolen information is formatted into JSON and exfiltrated by way of an HTTPS POST request to the attacker-controlled server eol4hkm8mfoeevs.m.pipedream.internet/service.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attacking, Hanoi, Hide, Malware, Operation, Payload, Professionals, PseudoPolyglot, Thief

Post navigation

Previous Post: Hackers Registered 2,000+ Fake Holiday-Themed Online Stores to Steal User Payments
Next Post: KimJongRAT Attacking Windows Users via Weaponized .hta Files to Steal Logins

Related Posts

Threat Actors Abuse Proofpoint’s and Intermedia’s Link Wrapping Features to Hide Phishing Payloads Threat Actors Abuse Proofpoint’s and Intermedia’s Link Wrapping Features to Hide Phishing Payloads Cyber Security News
UAC-0001 Hackers Attacking ICS Devices Running Windows Systems as a Server UAC-0001 Hackers Attacking ICS Devices Running Windows Systems as a Server Cyber Security News
CISA Warns of Google Chrome 0-Day Vulnerability Exploited in Attacks CISA Warns of Google Chrome 0-Day Vulnerability Exploited in Attacks Cyber Security News
Sweet Security Named Cloud Security Leader and CADR Leader in Latio Cloud Security Report Sweet Security Named Cloud Security Leader and CADR Leader in Latio Cloud Security Report Cyber Security News
Hackers Actively Exploiting AI Deployments Hackers Actively Exploiting AI Deployments Cyber Security News
PoC Exploit Released for Linux-PAM Vulnerability Allowing Root Privilege Escalation PoC Exploit Released for Linux-PAM Vulnerability Allowing Root Privilege Escalation Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News