Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
APT-Grade PDFSider Malware Used by Ransomware Groups

APT-Grade PDFSider Malware Used by Ransomware Groups

Posted on January 20, 2026January 20, 2026 By CWS

A newly recognized malware household with superior capabilities is being utilized in focused assaults, together with by a number of ransomware teams, Resecurity stories.

Dubbed PDFSider, the risk was designed to deploy a backdoor with encrypted command-and-control (C&C) capabilities and supply attackers with performance usually related to APTs, corresponding to cyberespionage and distant code execution (RCE).

The risk gives an interactive, hidden shell for command execution, and makes use of the Botan cryptographic library for authenticated encryption, exfiltrating command output by way of the encrypted communication channel.

PDFSider is sideloaded by way of the reputable PDF24 Creator utility, which is delivered to victims in a ZIP archive connected to spear-phishing emails. Working primarily in reminiscence, the malware units up communication, harvests system data, and begins the backdoor loop.

Resecurity says PDFSider was utilized in an assault in opposition to a Fortune 100 company, wherein the attackers used social engineering and QuickAssist to achieve distant entry.

Nevertheless, a number of ransomware teams are already utilizing it in assaults as a payload supply methodology, the cybersecurity agency notes.Commercial. Scroll to proceed studying.

A multi-stage setting validation routine permits PDFSider to detect digital environments and evaluation instruments, which make it engaging to cybercriminals.

It additionally consists of AV/EDR evasion, and the usage of DLL sideloading for supply additionally helps risk actors evade detection. In actual fact, Resecurity notes, each APTs and cybercriminals seem to have favored this code execution approach in latest assaults, and up to date stories from Acronis and Trellix verify it.

A well-liked approach for safety options bypass and code execution on Home windows methods, DLL sideloading depends on abusing a weak, reputable utility to load malicious DLLs and obtain persistence or escalate privileges.

APT and cybercrime teams abusing DLL sideloading

The China-linked APT Mustang Panda, Acronis stories, has used DLL sideloading in a latest marketing campaign concentrating on US authorities and policy-related entities within the context of the US-Venezuela battle.

The state-sponsored espionage group has relied on spear-phishing emails to ship a ZIP archive containing a reputable executable and a hidden DLL designed to be sideloaded for the execution of a customized C++ backdoor named LotusElite.

The backdoor can spawn a shell to allow distant code execution (RCE) and the retrieval of command output in actual time. Primarily based on obtained instructions, LotusElite can enumerate, create, and modify information.

The implant, Acronis notes, seems for use as a staging or beaconing server, because the attackers have been seen connecting a number of instances to the contaminated endpoints.

Using DLL sideloading in recent Mustang Panda assaults, nevertheless, is no surprise, because the APT is understood for using the approach for payload execution and detection evasion.

Final week, Trellix detailed the abuse of the reputable Ahost.exe utility, a element of the open supply C-ares library, for DLL sideloading in assaults involving commodity malware corresponding to data stealers and distant entry trojans (RATs).

Possible counting on phishing and utilizing localized filenames in Arabic, English, Farsi, Portuguese, and Spanish, the attackers abused DLL sideloading to contaminate victims with malware households corresponding to AgentTesla, FormBook, Lumma Stealer, Vidar, CryptBot, Remcos, QuasarRAT, DCRat, and XWorm.

Associated: Chinese language Cyberspies Deploy ‘BadAudio’ Malware by way of Provide Chain Assaults

Associated: Chinese language APT Exploits Unpatched Home windows Flaw in Latest Assaults

Associated: Russian Espionage Group Utilizing Ransomware in Assaults

Associated: Vietnamese Hackers Distribute Malware by way of Faux AI-Themed Web sites

Security Week News Tags:APTGrade, Groups, Malware, PDFSIDER, Ransomware

Post navigation

Previous Post: The Hidden Risk of Orphan Accounts
Next Post: Open Source Firewall OPNsense 25.7.11 Released With Host Discovery Service

Related Posts

Lee Enterprises Says 40,000 Hit by Ransomware-Caused Data Breach Lee Enterprises Says 40,000 Hit by Ransomware-Caused Data Breach Security Week News
UK’s Ransomware Payment Ban: Bold Strategy or Dangerous Gamble? UK’s Ransomware Payment Ban: Bold Strategy or Dangerous Gamble? Security Week News
Hackers Stole Data From Public Safety Comms Firm BK Technologies Hackers Stole Data From Public Safety Comms Firm BK Technologies Security Week News
Oracle E-Business Suite Zero-Day Exploited in Cl0p Attacks Oracle E-Business Suite Zero-Day Exploited in Cl0p Attacks Security Week News
Inside the 1 Billion Cloud Security Market: Acquisition, Expansion, and Where to Aim Next Inside the $111 Billion Cloud Security Market: Acquisition, Expansion, and Where to Aim Next Security Week News
GlassWorm Malware Returns to Open VSX, Emerges on GitHub GlassWorm Malware Returns to Open VSX, Emerges on GitHub Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News