A Chinese state-sponsored advanced persistent threat (APT) group has been linked to the compromise of a military organization based in the Philippines through the deployment of a newly identified fileless malware framework known as *EggStreme*. This stealthy, multi-stage toolkit allows the attackers to maintain long-term access while evading detection by injecting malicious code directly into system memory. One of the core mechanisms of this attack involves DLL sideloading, which enables the discreet execution of malicious payloads without leaving obvious traces. At the heart of this framework is *EggStremeAgent*, a powerful backdoor that facilitates deep system surveillance, lateral network movement, and the theft of sensitive information through an injected keylogger. The operation reportedly began with *EggStremeFuel* (“mscorsvc.dll”), a module responsible for system profiling and persistence setup. This component triggers additional loaders and eventually activates *EggStremeAgent*, ensuring seamless control over compromised systems. The malware's ability to interact with a command-and-control (C2) server allows it to collect system data, execute shell commands, transfer files, and even retrieve external IP addresses. Researchers at Bitdefender, who first observed the malicious activity in early 2024, noted the malware’s sophisticated communication methods, including the use of the gRPC protocol and integration of an auxiliary implant, *EggStremeWizard*. This secondary tool enables reverse shell access and file operations while leveraging multiple C2 endpoints to enhance the malware’s resilience. The framework consistently employs DLL sideloading tactics, where legitimate software is abused to load malicious components—a method that further conceals the attack chain. Notably, the attackers utilize the *Stowaway* proxy tool to strengthen their internal network presence. With its fileless architecture, memory-based execution, and layered complexity, EggStreme remains difficult to detect and remove. This campaign highlights the evolving strategies of Chinese APT groups, particularly in regions like the South China Sea, where geopolitical tensions remain high.
Cybercriminals are now weaponizing legitimate hotel reservation data to trick travelers into surrendering their payment details. This "Reservation Hijack Scam" stands out b...
A serious security issue has been discovered in nginx-ui, which can allow attackers to take full control of a system. This vulnerability is tracked as CVE-2026-33026. The problem e...
A sophisticated phishing campaign is targeting Spanish speaking users across Latin America and Europe, aiming to deploy Windows banking malware such as Casbaneiro (also known as Me...