Daily Tech News, Interviews, Reviews and Updates

Trend Micro Has Patched Bugs Used by Chinese Hackers for Deploying Malware

As per the sources, it claims that A DLL hijacking issue was patched in Trend Micro Security was utilized by a Chinese threat organization to side-load harmful DLLs and deliver viruses, according to Trend Micro. The hackers used the fact that security products operate with high privileges on Windows to install and import their own fraudulently engineered DLL into memory, enabling them to escalate privileges and execute malware, according to Sentinel Labs.

According to the cybersecurity company, they said that Trend Micro is informed of the research published on May 2, 2022, about a putative Central-Asian-based malicious attacker known as ‘Moshen Dragon,’ who had deployed malware groups that intended to hijack different prominent protection solutions, including one from Trend Micro.

Trend Micro Has Patched Bugs Used by Chinese Hackers for Deploying Malware

Moreover, following the data analysis and its product line, the team realized that only the Trend Micro Security consumer-focused product was compromised, without any other business or industrial goods. The antivirus vendor added that On May 19, 2022, a remedy for Trend Micro Security was delivered via Trend Micro’s ActiveUpdate (AU), and any customer with an active internet connection should get it soon if they haven’t already.

As per the sources, we also came to know that similar issues in security solutions from Bitdefender, McAfee, Symantec, and Kaspersky were exploited by the Moshen Dragon gang to install Impacket, a Python kit built for lateral movement and remote code activation via Windows Management Instrumentation (WMI). Impacket also has credential-stealing functionality, thanks to an open-source tool that records the information of a domain’s password changes occurring.

Furthermore, The Moshen Dragon operators’ final payloads contain PlugX and ShadowPad versions, two backdoors employed by various Chinese APTs in recent years. These approaches have been employed by malicious attackers to target Central Asian communications service providers to steal information from as much equipment as feasible.

 

 



Readers like you help support The Tech Outlook. When you make a purchase using links on our site, we may earn an affiliate commission. We cannot guarantee the Product information shown is 100% accurate and we advise you to check the product listing on the original manufacturer website. Thetechoutlook is not responsible for price changes carried out by retailers. The discounted price or deal mentioned in this item was available at the time of writing and may be subject to time restrictions and/or limited unit availability. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates Read More
You might also like

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More