Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network

Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network

Posted on October 21, 2025October 21, 2025 By CWS

Oct 21, 2025Ravie LakshmananCyber Espionage / Community Safety
A European telecommunications group is claimed to have been focused by a menace actor that aligns with a China-nexus cyber espionage group generally known as Salt Storm.
The group, per Darktrace, was focused within the first week of July 2025, with the attackers exploiting a Citrix NetScaler Gateway equipment to acquire preliminary entry.
Salt Storm, often known as Earth Estries, FamousSparrow, GhostEmperor, and UNC5807, is the identify given to a sophisticated persistent menace actor with ties to China. Recognized to be lively since 2019, the group gained prominence final yr following its assaults on telecommunications companies suppliers, vitality networks, and authorities methods within the U.S.
The adversary has a monitor document of exploiting safety flaws in edge units, sustaining deep persistence, and exfiltrating delicate knowledge from victims in additional than 80 international locations throughout North America, Europe, the Center East, and Africa.
Within the incident noticed in opposition to the European telecommunications entity, the attackers are stated to have leveraged the foothold to pivot to Citrix Digital Supply Agent (VDA) hosts within the consumer’s Machine Creation Providers (MCS) subnet, whereas additionally utilizing SoftEther VPN to obscure their true origins.

One of many malware households delivered as a part of the assault is Snappybee (aka Deed RAT), a suspected successor to the ShadowPad (aka PoisonPlug) malware that has been deployed in prior Salt Storm assaults. The malware is launched by the use of a method referred to as DLL side-loading, which has been adopted by numerous Chinese language hacking teams over time.
“The backdoor was delivered to those inner endpoints as a DLL alongside professional executable recordsdata for antivirus software program comparable to Norton Antivirus, Bkav Antivirus, and IObit Malware Fighter,” Darktrace stated. “This sample of exercise signifies that the attacker relied on DLL side-loading through professional antivirus software program to execute their payloads.”
The malware is designed to contact an exterior server (“aar.gandhibludtric[.]com”) over HTTP and an unidentified TCP-based protocol. Darktrace stated the intrusion exercise was recognized and remediated earlier than it may escalate additional.
“Salt Storm continues to problem defenders with its stealth, persistence, and abuse of professional instruments,” the corporate added. “The evolving nature of Salt Storm’s tradecraft, and its capacity to repurpose trusted software program and infrastructure, ensures it is going to stay tough to detect utilizing standard strategies alone.”

The Hacker News Tags:Breach, Citrix, European, Flaw, Hackers, Malware, Network, Snappybee, Telecom

Post navigation

Previous Post: AWS Declares Major Outage Resolved After Nearly 24 Hours of Disruption
Next Post: Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers

Related Posts

NSO Group Fined 8M for Targeting 1,400 WhatsApp Users With Pegasus Spyware NSO Group Fined $168M for Targeting 1,400 WhatsApp Users With Pegasus Spyware The Hacker News
TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies The Hacker News
Critical n8n Vulnerability Allows System Commands Execution Critical n8n Vulnerability Allows System Commands Execution The Hacker News
The Wild West of Shadow IT The Wild West of Shadow IT The Hacker News
Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; M Stolen in Crypto Heist Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist The Hacker News
OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI
  • Mac Users Face New Cloudflare-Themed Malware Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI
  • Mac Users Face New Cloudflare-Themed Malware Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark