Close Menu
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
What's Hot

Tornado Cash dev’s attorneys say prosecutors hid exculpatory evidence

May 18, 2025

Grok says it’s ‘skeptical’ about Holocaust death toll, then blames ‘programming error’

May 18, 2025

Wes Anderson Thrills Cannes With ‘The Phoenician Scheme’ Premiere

May 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
Home » Chinese Hackers Abuse IPv6 SLAAC for AitM Attacks via Spellbinder Lateral Movement Tool
Cybersecurity

Chinese Hackers Abuse IPv6 SLAAC for AitM Attacks via Spellbinder Lateral Movement Tool

HarishBy HarishApril 30, 2025No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
Share
Facebook Twitter Pinterest Reddit WhatsApp Email


Apr 30, 2025Ravie LakshmananMalware / DNS Security

A China-aligned advanced persistent threat (APT) group called TheWizards has been linked to a lateral movement tool called Spellbinder that can facilitate adversary-in-the-middle (AitM) attacks.

“Spellbinder enables adversary-in-the-middle (AitM) attacks, through IPv6 stateless address autoconfiguration (SLAAC) spoofing, to move laterally in the compromised network, intercepting packets and redirecting the traffic of legitimate Chinese software so that it downloads malicious updates from a server controlled by the attackers,” ESET researcher Facundo Muñoz said in a report shared with The Hacker News.

The attack paves the way for a malicious downloader that’s delivered by hijacking the software update mechanism associated with Sogou Pinyin. The downloader then acts as a conduit to drop a modular backdoor codenamed WizardNet.

This is not the first time Chinese threat actors have abused Sogou Pinyin’s software update process to deliver their own malware. In January 2024, ESET detailed a hacking group referred to as Blackwood that has deployed an implant named NSPX30 by taking advantage of the update mechanism of the Chinese input method software application.

Cybersecurity

Then earlier this year, the Slovak cybersecurity company revealed another threat cluster known as PlushDaemon that leveraged the same technique to distribute a custom downloader called LittleDaemon.

TheWizards APT is known to target both individuals and the gambling sectors in Cambodia, Hong Kong, Mainland China, the Philippines, and the United Arab Emirates.

Evidence suggests that the Spellbinder IPv6 AitM tool has been put to use by the threat actor since at least 2022. While the exact initial access vector used in the attacks is unknown at this stage, successful access is followed by the delivery of a ZIP archive that contains four different files: AVGApplicationFrameHost.exe, wsc.dll, log.dat, and winpcap.exe.

The threat actors then proceed to install “winpcap.exe” and run “AVGApplicationFrameHost.exe,” the latter of which is abused to sideload the DLL. The DLL file subsequently reads shellcode from “log.dat” and executes it in memory, causing Spellbinder to be launched in the process.

“Spellbinder uses the WinPcap library to capture packets and to reply to packets when needed,” Muñoz explained. “It takes advantage of IPv6’s Network Discovery Protocol in which ICMPv6 Router Advertisement (RA) messages advertise that an IPv6-capable router is present in the network so that hosts that support IPv6, or are soliciting an IPv6-capable router, can adopt the advertising device as their default gateway.”

In one attack case observed in 2024, the threat actors are said to have utilized this method to hijack the software update process for Tencent QQ at the DNS level to serve a trojanized version that then deploys WizardNet, a modular backdoor that’s equipped to receive and run .NET payloads on the infected host.

Spellbinder pulls this off by intercepting the DNS query for the software update domain (“update.browser.qq[.]com”) and issuing a DNS response with the IP address of an attacker-controlled server (“43.155.62[.]54”) hosting the malicious update.

Cybersecurity

Another noteworthy tool in TheWizards’ arsenal is DarkNights, which is also called DarkNimbus by Trend Micro and has been attributed to another Chinese hacking group tracked as Earth Minotaur. That said, both clusters are being treated as independent operators, citing differences in tooling, infrastructure, and targeting footprints.

It has since emerged that a Chinese public security ministry contractor named Sichuan Dianke Network Security Technology Co., Ltd. (aka UPSEC) is the supplier of the DarkNimbus malware.

“While TheWizards uses a different backdoor for Windows (WizardNet), the hijacking server is configured to serve DarkNights to updating applications running on Android devices,” Muñoz said. “This indicates that Dianke Network Security is a digital quartermaster to TheWizards APT group.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



Source link

Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
Previous ArticleMeet David Corenswet, cinema’s new Superman
Next Article [Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats
Harish
  • Website
  • X (Twitter)

Related Posts

New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors

May 16, 2025

Top 10 Best Practices for Effective Data Protection

May 16, 2025

Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks

May 16, 2025

Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks

May 16, 2025

Learn a Smarter Way to Defend Modern Applications

May 16, 2025

Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Our Picks

Tornado Cash dev’s attorneys say prosecutors hid exculpatory evidence

May 18, 2025

Grok says it’s ‘skeptical’ about Holocaust death toll, then blames ‘programming error’

May 18, 2025

Wes Anderson Thrills Cannes With ‘The Phoenician Scheme’ Premiere

May 18, 2025

Anime Expo Hosts Mobile Suit Gundam GQuuuuuuX Staff, Naohiro Ogata, Peach-Pit, More – News

May 18, 2025
Don't Miss
Blockchain

Tornado Cash dev’s attorneys say prosecutors hid exculpatory evidence

May 18, 20252 Mins Read

Attorneys for Tornado Cash developer Roman Storm filed a motion asking the court to reconsider…

‘Bitcoin Standard’ author backs funding dev to make spamming Bitcoin costly

May 18, 2025

The Public internet is a bottleneck for blockchain — DoubleZero CEO

May 17, 2025

High-speed oracles disrupting $50B finance data industry — Web3 Exec

May 17, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to Luminari, your go-to hub for mastering modern tech and staying ahead in the digital world.

At Luminari, we’re passionate about breaking down complex technologies and delivering insights that matter. Whether you’re a developer, tech enthusiast, job seeker, or lifelong learner, our mission is to equip you with the tools and knowledge you need to thrive in today’s fast-moving tech landscape.

Our Picks

Grok says it’s ‘skeptical’ about Holocaust death toll, then blames ‘programming error’

May 18, 2025

U.S. lawmakers have concerns about Apple-Alibaba deal

May 18, 2025

Microsoft’s Satya Nadella is choosing chatbots over podcasts

May 17, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 luminari. Designed by luminari.

Type above and press Enter to search. Press Esc to cancel.