InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Confucius hackers hit Pakistan with new Wooperstealer and Anonymous malware
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Confucius hackers hit Pakistan with new Wooperstealer and Anonymous malware
Technology

Confucius hackers hit Pakistan with new Wooperstealer and Anonymous malware

October 2, 2025 3 Min Read
Share
Confucius hackers hit Pakistan with new Wooperstealer and Anonymous malware
SHARE

The threat actor known as Confucius is attributed to a new phishing campaign targeting Pakistan, which has malware families such as Wooperstealer and Anondoor.

“For the past decade, Confucius has repeatedly targeted government agencies, military organizations, defense contractors, especially important industries in Pakistan.

Confucius has been active since 2013 and is a long-term hacking group believed to be active throughout South Asia. A recent campaign conducted by threat actors employs a Python-based backdoor called Anondoor, showing the group’s evolution of commerce and its technical agility.

One of the attack chains targeted at Pakistani users in December 2024 will trick the recipient into opening a .ppsx file and use DLL sideload technology to trigger the delivery of WooperSteler.

The subsequent attack wave, observed in March 2025, unleashed the malicious Wooperstealer DLL using a Windows shortcut (.lnk) file, then rebooted using DLL sideloads, and stole sensitive data from the compromised host.

Another .lnk file discovered in August 2025 utilized similar tactics to remove the malformed dlls. This time, DLL opens the way to Anondoor. This is waiting for further tasks to remove device information to an external server and execute commands, screenshots, screenshots, and directory passwords.

It is worth noting that the use of threat actor Anondoor was documented in July 2025 by SeeBug’s known Sec 404 team.

“This group has tweaked that toolset to demonstrate strong adaptability, avoid detection, adjust its toolset and change the prioritization of intelligence collection,” Fortinet said. “Recent campaigns have demonstrated Confucius’ sustainability as well as its ability to pivot quickly among its methods, infrastructure and malware families, maintaining operational effectiveness.”

Disclosure occurs when the K7 Security Lab details infection sequences associated with patchwork groups in detail. This starts with a malicious macro designed to download additional payloads, leverage DLL sideload to launch primary malware, and simultaneously download PowerShell code that takes advantage of DLL sideload while simultaneously displaying decoy PDF documents.

See also  Legacy Python bootstrap script creates domain takeover risk for multiple PyPI packages

The final payload establishes contact with the threat actor’s command and control (C2) server, collects system information, and retrieves encoded instructions that are decrypted to execute using CMD.exe. It also has equipment to take screenshots, upload files from your machine, download files from a remote URL, and save them locally in a temporary directory.

“Malware waits for a configurable period to resend data up to 20 times, tracking out failures and ensuring persistent, stealth data removal without warning users or security systems,” the company said.

Share This Article
Twitter Copy Link
Previous Article Kingdom Come Deliverance2 is my favorite RPG of the year, over 40% Kingdom Come Deliverance2 is my favorite RPG of the year, over 40%
Next Article Election votes mailed on November 4 may not be counted, state officials warn Election votes mailed on November 4 may not be counted, state officials warn

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

China-linked APT31 launches stealth cyber attack on Russian IT using cloud services
Technology

China-linked APT31 launches stealth cyber attack on Russian IT using cloud services

5 Min Read
comicform and sectorJ149 hacker deploys form book malware in Eurasian cyberattack
Technology

comicform and sectorJ149 hacker deploys form book malware in Eurasian cyberattack

5 Min Read
Batshadow Group hunts job seekers using the new GO-based "Vampire Bot" malware
Technology

Batshadow Group hunts job seekers using the new GO-based “Vampire Bot” malware

4 Min Read
Europol dismantles SIM farm network running 49 million fake accounts worldwide
Technology

Europol dismantles SIM farm network running 49 million fake accounts worldwide

4 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?