HomeCII/OTNewly Identified Chinese APT Conceals Backdoor in Software Updates

Newly Identified Chinese APT Conceals Backdoor in Software Updates

Published on

spot_img

A previously unknown Chinese threat actor has been making waves in the cyber-espionage world since 2018, when they began using a novel backdoor in adversary-in-the-middle (AitM) attacks against Chinese and Japanese targets. ESET researchers have named this group “Blackwood,” and they have targeted a range of victims, including a large Chinese manufacturing and trading company, the Chinese office of a Japanese engineering and manufacturing company, individuals in China and Japan, and a Chinese-speaking person connected with a high-profile research university in the UK.

The reason that Blackwood has only recently been identified, more than six years since its earliest known activity, can be attributed to its ability to easily conceal malware in updates for popular software products like WPS Office. The malware itself, known as “NSPX30,” is a highly sophisticated espionage tool, which has allowed Blackwood to operate under the radar.

NSPX30 is the result of nearly two decades of research and development, following a long lineage of backdoors dating back to 2005, with various iterations used to target individuals and entities in Hong Kong, Taiwan, and mainland China. NSPX30 is a multifunctional tool capable of a wide range of espionage activities, including data theft, establishing a reverse shell, intercepting network traffic, and evading detection by Chinese antivirus tools.

The most intriguing aspect of Blackwood’s operation is their ability to inject their backdoor into legitimate software updates, which are downloaded from reputable corporate servers via unencrypted HTTP. This method bypasses typical cybersecurity measures and has been used to infect machines with NSPX30. The software products being targeted include WPS Office, QQ instant messaging service, and the Sogou Pinyin input method editor.

Organizations are advised to take proactive measures to defend against this threat, including ensuring that endpoint protection tools block NSPX30 and monitoring for malware detections related to legitimate software systems. Disabling IPv6 can also help thwart attack attempts. Additionally, a well-segmented network can help limit the impact of adversary-in-the-middle attacks.

With Blackwood’s use of evasive tactics and sophisticated malware, it is clear that they pose a significant threat to organizations and individuals in China and Japan. As researchers and cybersecurity professionals continue to study and respond to this threat, the hope is that more effective ways of combating Blackwood’s insidious activities will be identified.

Source link

Latest articles

AI and Chatbots Revolutionizing the Future of Consumer Lending

Artificial intelligence (AI) and chatbot technology are at the forefront of transforming the consumer...

Microsoft Releases Emergency Patch for Critical Security Vulnerability in ASP.NET Core Update

Security Advisory Highlights Critical Vulnerability in ASP.NET A significant security advisory has been published highlighting...

SystemBC C2 Server Exposes Over 1,570 Victims in Gentlemen Ransomware Operation

Threat actors connected to the Gentlemen ransomware-as-a-service (RaaS) operation have recently been observed making...

Cyber Briefing – April 22, 2026 – CyberMaterial

North Korean Cyber Attacks Escalate, Targeting Financial and Healthcare Sectors In a recently published report,...

More like this

AI and Chatbots Revolutionizing the Future of Consumer Lending

Artificial intelligence (AI) and chatbot technology are at the forefront of transforming the consumer...

Microsoft Releases Emergency Patch for Critical Security Vulnerability in ASP.NET Core Update

Security Advisory Highlights Critical Vulnerability in ASP.NET A significant security advisory has been published highlighting...

SystemBC C2 Server Exposes Over 1,570 Victims in Gentlemen Ransomware Operation

Threat actors connected to the Gentlemen ransomware-as-a-service (RaaS) operation have recently been observed making...