Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus

New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus

Posted on September 24, 2025September 24, 2025 By CWS

Sep 24, 2025Ravie LakshmananMalware / Home windows Safety

Cybersecurity researchers have disclosed particulars of a brand new malware household dubbed YiBackdoor that has been discovered to share “vital” supply code overlaps with IcedID and Latrodectus.
“The precise connection to YiBackdoor isn’t but clear, however it could be used along side Latrodectus and IcedID throughout assaults,” Zscaler ThreatLabz mentioned in a Tuesday report. “YiBackdoor is ready to execute arbitrary instructions, gather system data, seize screenshots, and deploy plugins that dynamically increase the malware’s performance.”
The cybersecurity firm mentioned it first recognized the malware in June 2025, including it could be serving as a precursor to follow-on exploitation, akin to facilitating preliminary entry for ransomware assaults. Solely restricted deployments of YiBackdoor have been detected up to now, indicating it is at the moment both below improvement or being examined.

Given the similarities between YiBackdoor, IcedID, and Latrodectus, it is being assessed with medium to excessive confidence that the brand new malware is the work of the identical builders who’re behind the opposite two loaders. It is also value noting that Latrodectus, in itself, is believed to be a successor of IcedID.
YiBackdoor options rudimentary anti-analysis strategies to evade virtualized and sandboxed environments, whereas incorporating capabilities to inject the core performance into the “svchost.exe” course of. Persistence on the host is achieved through the use of the Home windows Run registry key.
“YiBackdoor first copies itself (the malware DLL) right into a newly created listing below a random identify,” the corporate mentioned. “Subsequent, YiBackdoor provides regsvr32.exe malicious_path within the registry worth identify (derived utilizing a pseudo-random algorithm) and self-deletes to hinder forensic evaluation.”
An embedded encrypted configuration throughout the malware is used to extract the command-and-control (C2) server, after which it establishes a connection to obtain instructions in HTTP responses –

Systeminfo, to gather system metadata
display screen, to take a screenshot
CMD, to execute a system shell command utilizing cmd.exe
PWS, to execute a system shell command utilizing PowerShell
plugin, to move a command to an present plugin and transmit the outcomes again to the server
job, to initialize and execute a brand new plugin that is Base64-encoded and encrypted

Zscaler’s evaluation of YiBackdoor has uncovered various code overlaps between YiBackdoor, IcedID, and Latrodectus, together with the code injection technique, the format and size of the configuration decryption key, and the decryption routines for the configuration blob and the plugins.
“YiBackdoor by default has considerably restricted performance, nevertheless, risk actors can deploy extra plugins that increase the malware’s capabilities,” Zscaler mentioned. “Given the restricted deployment up to now, it’s doubtless that risk actors are nonetheless creating or testing YiBackdoor.”
New Variations of ZLoader Noticed
The event comes because the cybersecurity agency examined two new variations of ZLoader (aka DELoader, Terdot, or Silent Evening) – 2.11.6.0 and a pair of.13.7.0 – that incorporate additional enhancements to its code obfuscation, community communications, anti-analysis strategies, and evasion capabilities.

Notable among the many modifications are LDAP-based community discovery instructions that may be leveraged for community discovery and lateral motion, in addition to an enhanced DNS-based community protocol that makes use of customized encryption with the choice of utilizing WebSockets.
Assaults distributing the malware loader are mentioned to be extra exact and focused, being deployed solely in opposition to a small variety of entities fairly than in an indiscriminate trend.
“ZLoader 2.13.7.0 contains enhancements and updates to the customized DNS tunnel protocol for command-and-control (C2) communications, together with added help for WebSockets,” Zscaler mentioned. “ZLoader continues to evolve its anti-analysis methods, leveraging revolutionary strategies to evade detection.”

The Hacker News Tags:Code, IcedID, Latrodectus, Major, Malware, Overlaps, Shares, YiBackdoor

Post navigation

Previous Post: The Blind Spot Fueling Payment Skimmer Attacks
Next Post: Weaponized Malwarebytes, LastPass, Citibank, SentinelOne, and Others on GitHub Deliver Malware

Related Posts

U.S. Seizes .74M in Crypto Tied to North Korea’s Global Fake IT Worker Network U.S. Seizes $7.74M in Crypto Tied to North Korea’s Global Fake IT Worker Network The Hacker News
Cybersecurity Trends: Persistent Threats and New Vulnerabilities Cybersecurity Trends: Persistent Threats and New Vulnerabilities The Hacker News
RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories The Hacker News
Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls The Hacker News
Silver Fox Exploits Microsoft-Signed WatchDog Driver to Deploy ValleyRAT Malware Silver Fox Exploits Microsoft-Signed WatchDog Driver to Deploy ValleyRAT Malware The Hacker News
Think Your IdP or CASB Covers Shadow IT? These 5 Risks Prove Otherwise Think Your IdP or CASB Covers Shadow IT? These 5 Risks Prove Otherwise The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News