Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
State Hackers Exploit RDP Servers to Deploy Stealthy Malware

State Hackers Exploit RDP Servers to Deploy Stealthy Malware

Posted on March 24, 2026 By CWS

A sophisticated state-backed hacking group, notorious for targeting critical sectors, is now focusing on Remote Desktop Protocol (RDP) servers. This group, identified as APT-C-13 and also known by names such as Sandworm and APT44, has been active in cyber espionage operations since 2009. Their latest campaign signifies a strategic move towards long-term infiltration aimed at intelligence gathering.

Change in Strategy: From Destruction to Infiltration

APT-C-13 has shifted its approach from immediate disruption to sustained espionage. This campaign uses a deceptive ISO image named Microsoft.Office.2025×64.v2025.iso, distributed on Telegram and other platforms, primarily targeting users in Ukraine. Upon mounting the image, unsuspecting users trigger hidden executables that begin the infection process.

By exploiting the trust associated with familiar software names, these executables install a loader that profiles the victim’s system, preparing it for further malicious payloads. Weixin’s 360 Threat Intelligence Center has confirmed that APT-C-13 is utilizing a modular framework known as the Tambur/Sumbur/Kalambur series.

Technical Details and Impact

The campaign’s impact is profound, using legitimate Windows tools such as PowerShell and SSH to remain undetected by conventional antivirus software. This strategic patience allows the attackers to extract sensitive information over months. The group achieves persistence through scheduled tasks that mimic legitimate Windows components, maintaining constant access via the RDP service.

Further control is established using the Kalambur and Sumbur modules, which channel command-and-control traffic through the Tor network, concealing the attackers’ locations. SSH reverse tunneling allows remote access to infected systems, while Sumbur integrates seamlessly with Windows processes, further obfuscating its presence.

Recommendations for Mitigation

The DemiMur module exacerbates the threat by injecting a forged root certificate, causing Windows to trust all malicious payloads. This, combined with disabling Microsoft Defender protections, renders the system vulnerable. To counteract this, organizations should block unauthorized ISO images and activation tools, and monitor internal network activities for anomalies.

Ensuring endpoint security is up-to-date and conducting regular scans are crucial steps. Additionally, institutions should enhance auditing practices and establish detection rules for unusual RDP and SSH activity, mitigating the risk of long-term data breaches.

Stay informed about the latest updates by following us on Google News, LinkedIn, and X. Set CSN as your preferred source on Google for timely cybersecurity news.

Cyber Security News Tags:APT-C-13, APT44, cyber defense, Cybersecurity, intelligence operations, Malware, network security, persistent threats, RDP, remote desktop, Sandworm, Seashell Blizzard, state-backed hacking, Voodoo Bear

Post navigation

Previous Post: Webinar Explores Practical Use of CIS Controls
Next Post: Key Insights from Gartner’s Guardian Agents Guide

Related Posts

Capita To pay £14 Million For Data Breach Exposes 6.6 Million Users Personal Data Capita To pay £14 Million For Data Breach Exposes 6.6 Million Users Personal Data Cyber Security News
15 Best Incident Response Tools 2025 15 Best Incident Response Tools 2025 Cyber Security News
Anatsa Android Banking Malware from Google Play Targeting Users in the U.S. and Canada Anatsa Android Banking Malware from Google Play Targeting Users in the U.S. and Canada Cyber Security News
Threat Actors Weaponizing SVG Files to Embed Malicious JavaScript Threat Actors Weaponizing SVG Files to Embed Malicious JavaScript Cyber Security News
Critical FortiSIEM Vulnerability Let Attackers to Execute Malicious Commands Critical FortiSIEM Vulnerability Let Attackers to Execute Malicious Commands Cyber Security News
Developers Expose Passwords and API Keys via Online Tools like JSONFormatter Developers Expose Passwords and API Keys via Online Tools like JSONFormatter Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • TeamPCP’s Kubernetes Wiper Escalates Threat in Iran
  • Resilient Tycoon2FA Phishing Platform Bounces Back Rapidly
  • Poland Sees Spike in Cyberattacks Targeting Energy Sector
  • Critical Dell Wyse Security Flaws Threaten Systems
  • DoE Unveils Strategic 5-Year Energy Security Plan

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • TeamPCP’s Kubernetes Wiper Escalates Threat in Iran
  • Resilient Tycoon2FA Phishing Platform Bounces Back Rapidly
  • Poland Sees Spike in Cyberattacks Targeting Energy Sector
  • Critical Dell Wyse Security Flaws Threaten Systems
  • DoE Unveils Strategic 5-Year Energy Security Plan

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark