ESET has identified a China-aligned advanced persistent threat (APT) group, TheWizards, conducting adversary-in-the-middle (AitM) attacks by abusing a feature of the IPv6 protocol to hijack software updates and deploy malware on Windows systems. Active since at least 2022, TheWizards has targeted entities in the Philippines, Cambodia, the UAE, China, and Hong Kong, including individuals and gambling companies. The group uses a custom tool named Spellbinder, which exploits the Stateless Address Autoconfiguration (SLAAC) feature in IPv6. SLAAC allows devices to automatically configure their IP addresses and network settings by processing Router Advertisement (RA) messages, without relying on a DHCP server. Spellbinder sends spoofed RA messages to nearby devices every 200 milliseconds, tricking them into adopting a malicious default gateway controlled by the attackers. This reroutes traffic through the attacker’s system, enabling interception and manipulation. Spellbinder is delivered via a ZIP file (AVGApplicationFrameHostS.zip) that mimics legitimate software. It installs malware by side-loading a malicious wsc.dll using a legitimate winpcap.exe. Once active, Spellbinder monitors traffic for domains linked to major Chinese companies (e.g., Tencent, Xiaomi, Baidu) and redirects requests to attacker-controlled servers, delivering malicious updates that install a persistent backdoor called WizardNet. WizardNet gives attackers long-term access to infected systems and allows for additional payloads. To mitigate risk, organizations should monitor IPv6 traffic, disable the protocol if unused, and watch for rogue RA messages. The incident highlights growing threats from IPv6 abuse and software update hijacking.
A publicly released proof-of-concept for CVE-2025-32463 demonstrates a local privilege escalation in the Sudo utility that can lead to full root access when certain chroot-related ...
CYFIRMA researchers have discovered Yurei Ransomware, a new Go-based malware that encrypts files and spreads through SMB shares and removable drives. Designed for stealth and speed...
Cybersecurity professionals have reported a rampant growth in ransomware attacks leveraging legitimate Remote Access Tools (RATs) such as AnyDesk, UltraViewer, RustDesk, Splashtop,...