Over 80 ShadowPad malware C2 servers unmasked

Share post:

VMware Threat Analysis Unit (TAU) have uncovered 85 command-and-control (C2) servers supported by ShadowPad malware since September 2021.

ShadowPad is a modular backdoor known among China-based threat actors, including such clusters of espionage activities.

The malware can also be used to download other malicious payloads, paving the way for wider exploitation. Research data shows that the root of the malware can be traced back to the PlugX malware.

To detect 85 C2 servers, the researchers studied three ShadowPad variants that used TCP, UDP and HTTP(S) protocols for C2 communication.

VMware researchers explained that an analysis of the three ShadowPad artefacts were used by Winnti, Tonto Team, and an emerging threat cluster codenamed Space Pirates made it possible to detect the C2 servers by searching the list of open hosts generated by a tool called ZMap.

VMware also detected Spyder and ReverseWindow malware samples communicating with ShadowPad C2 IP addresses. The two malware samples are considered malicious tools used by APT41 (aka Winnti) and LuoYu. Overlaps were also observed between the Spyder sample and a worker component of the threat actor’s Winnti 4.0 trojan.

The sources for this piece include an article in TheHackerNews.

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday May 17, 2024

Welcome to Cyber Security Today. This is the Week in Review for the week ending Friday, May 17th,...

Cyber Security Today, May 17, 2024 – Malware hiding in Apache Tomcat servers

Malware hiding in Apache Tomcat servers, new backdoors found, and more Welcome to Cyber Security Today. It's Friday, May...

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Cyber Security Today, May 15, 2024 – Ebury botnet still exploits Linux servers, Microsoft, SAP and Apple issue security updates

The Ebury botnet continues to exploit Linux servers, Microsoft, SAP and Apple issue security updates, and more. Welcome to...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways