InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Confucius hackers hit Pakistan with new Wooperstealer and Anonymous malware
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Confucius hackers hit Pakistan with new Wooperstealer and Anonymous malware
Technology

Confucius hackers hit Pakistan with new Wooperstealer and Anonymous malware

October 2, 2025 3 Min Read
Share

The threat actor known as Confucius is attributed to a new phishing campaign targeting Pakistan, which has malware families such as Wooperstealer and Anondoor.

“For the past decade, Confucius has repeatedly targeted government agencies, military organizations, defense contractors, especially important industries in Pakistan.

Confucius has been active since 2013 and is a long-term hacking group believed to be active throughout South Asia. A recent campaign conducted by threat actors employs a Python-based backdoor called Anondoor, showing the group’s evolution of commerce and its technical agility.

One of the attack chains targeted at Pakistani users in December 2024 will trick the recipient into opening a .ppsx file and use DLL sideload technology to trigger the delivery of WooperSteler.

The subsequent attack wave, observed in March 2025, unleashed the malicious Wooperstealer DLL using a Windows shortcut (.lnk) file, then rebooted using DLL sideloads, and stole sensitive data from the compromised host.

Another .lnk file discovered in August 2025 utilized similar tactics to remove the malformed dlls. This time, DLL opens the way to Anondoor. This is waiting for further tasks to remove device information to an external server and execute commands, screenshots, screenshots, and directory passwords.

It is worth noting that the use of threat actor Anondoor was documented in July 2025 by SeeBug’s known Sec 404 team.

“This group has tweaked that toolset to demonstrate strong adaptability, avoid detection, adjust its toolset and change the prioritization of intelligence collection,” Fortinet said. “Recent campaigns have demonstrated Confucius’ sustainability as well as its ability to pivot quickly among its methods, infrastructure and malware families, maintaining operational effectiveness.”

Disclosure occurs when the K7 Security Lab details infection sequences associated with patchwork groups in detail. This starts with a malicious macro designed to download additional payloads, leverage DLL sideload to launch primary malware, and simultaneously download PowerShell code that takes advantage of DLL sideload while simultaneously displaying decoy PDF documents.

See also  Researchers discover more than 30 flaws in AI coding tools that enable data theft and RCE attacks

The final payload establishes contact with the threat actor’s command and control (C2) server, collects system information, and retrieves encoded instructions that are decrypted to execute using CMD.exe. It also has equipment to take screenshots, upload files from your machine, download files from a remote URL, and save them locally in a temporary directory.

“Malware waits for a configurable period to resend data up to 20 times, tracking out failures and ensuring persistent, stealth data removal without warning users or security systems,” the company said.

Share This Article
Twitter Copy Link
Previous Article Kingdom Come Deliverance2 is my favorite RPG of the year, over 40% Kingdom Come Deliverance2 is my favorite RPG of the year, over 40%
Next Article Election votes mailed on November 4 may not be counted, state officials warn Election votes mailed on November 4 may not be counted, state officials warn

You Might Also Like

Chinese APT
Technology

Chinese apt deploys egg stream fireless malware to infringe Philippine military systems

4 Min Read
Two new Super Micro BMC bugs allow malicious firmware to circumvent the trust security route
Technology

Two new Super Micro BMC bugs allow malicious firmware to circumvent the trust security route

4 Min Read
UNC1549 Hacking 34 devices from 11 telecom companies via LinkedIn Job Lures and Minibike malware
Technology

UNC1549 Hacking 34 devices from 11 telecom companies via LinkedIn Job Lures and Minibike malware

8 Min Read
Strela Stealer running detour dog running through a DNS-powered malware factory
Technology

Strela Stealer running detour dog running through a DNS-powered malware factory

8 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?