Security News > 2022 > October > Researchers Expose Over 80 ShadowPad Malware C2 Servers
As many as 85 command-and-control servers have been discovered supported by the ShadowPad malware since September 2021, with infrastructure detected as recently as October 16, 2022.
That's according to VMware's Threat Analysis Unit, which studied three ShadowPad variants using TCP, UDP, and HTTP(S) protocols for C2 communications.
ShadowPad, seen as a successor to PlugX, is a modular malware platform privately shared among multiple Chinese state-sponsored actors since 2015.
Taiwanese cybersecurity firm TeamT5, earlier this May, disclosed details of another China-nexus modular implant named Pangolin8RAT, which is believed to be the successor of the PlugX and ShadowPad malware families, linking it to a threat group dubbed Tianwu.
An analysis of the three ShadowPad artifacts, which have been previously put to use by Winnti, Tonto Team, and an emerging threat cluster codenamed Space Pirates, made it possible to discover the C2 servers by scanning the list of open hosts generated by a tool called ZMap, VMware said.
The company further disclosed it identified Spyder and ReverseWindow malware samples communicating with ShadowPad C2 IP addresses, both of which are malicious tools put to use by APT41 and LuoYu.
News URL
https://thehackernews.com/2022/10/researchers-expose-over-80-shadowpad.html
Related news
- Researchers Uncover Hijack Loader Malware Using Stolen Code-Signing Certificates (source)
- Perfctl malware strikes again as crypto-crooks target Docker Remote API servers (source)
- Researchers Uncover Malware Using BYOVD to Bypass Antivirus Protections (source)
- Researchers discover first UEFI bootkit malware for Linux (source)