Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Waymo temporarily suspends service in San Francisco as robotaxis stall due to power outage

Iran’s Infy APT resurfaces with new malware activity after years of silence

Google and Apple reportedly warned employees with visas to avoid traveling abroad

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » WIRTE uses AshenLoader sideloading to install AshTag spy backdoor
Identity

WIRTE uses AshenLoader sideloading to install AshTag spy backdoor

userBy userDecember 11, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

December 11, 2025Ravi LakshmananCyberwarfare/Threat Intelligence

The Advanced Persistent Threat (APT), known as WIRTE, is believed to be the result of attacks targeting government and diplomatic organizations across the Middle East since 2020 using a previously undocumented malware suite called AshTag.

Palo Alto Networks is tracking an activity cluster named Ashen Lepus. Artifacts uploaded to the VirusTotal platform indicate that the threat actor has set its sights on Oman and Morocco, indicating an expanding footprint beyond the Palestinian Authority, Jordan, Iraq, Saudi Arabia, and Egypt.

“Ashen Repas remained active throughout the Israeli-Hamas conflict, setting it apart from other related organizations whose activity declined during the same period,” the cybersecurity firm said in a report shared with Hacker News. “Ashen Lepus continued its campaign after the Gaza ceasefire in October 2025, deploying newly developed malware variants and engaging in live operations within victim environments.”

cyber security

WIRTE overlaps with the Arabic-speaking politically motivated cluster known as the Gaza Cyber ​​Gang (also known as Blackstem, Extreme Jackals, Morerats, or TA402), and is assessed to have been active since at least 2018. According to the Cybereason report, Morerat and APT-C-23 (also known as Arid Vipers, Desert Burnish, or Renegade Jackals) are both two major subgroups of the Gaza Cyber ​​Gang. Hamas’ cyberwarfare division.

It is primarily driven by espionage and intelligence gathering, targeting government agencies in the Middle East to achieve strategic objectives.

In a report released in November 2024, Check Point highlighted the hacking group’s ability to adapt and carry out both espionage and sabotage by targeting Israeli organizations in devastating attacks, infecting them with custom wiper malware called SameCoin.

This long-running and elusive campaign, detailed by Unit 42, dates back to 2018 and was found to have utilized phishing emails containing decoys related to geopolitical issues in the region. The recent increase in Turkey-related invitations, such as the “Partnership Agreement between Morocco and Turkey” and the “Resolution on Palestinian Statehood,” suggests that domestic organizations may become a new focus.

The attack chain begins with a benign PDF decoy that tricks the recipient into downloading a RAR archive from a file-sharing service. Opening the archive triggers a series of events that result in the AshTag being deployed.

This involves using a renamed, benign binary to sideload a malicious DLL called AshenLoader. In addition to opening a decoy PDF file to continue its ruse, this DLL connects to an external server and drops two more components: a legitimate executable and a DLL payload called AshenStager (also known as stagerx64). This DLL payload is sideloaded again to launch the malware suite in memory to minimize forensic artifacts.

AshTag is a modular .NET backdoor designed to facilitate persistence and remote command execution, disguised as a legitimate VisualServer utility. Internally, its functionality is realized by AshenOrchestrator, which enables communication and executes additional payloads in memory.

cyber security

These payloads serve various purposes.

Persistence and Process Management Update and Delete Screen Capture File Explorer and Management System Fingerprinting

In one case, Unit 42 said it observed threat actors performing actual data theft by gaining access to a compromised machine and staging targeted documents in the C:\Users\Public folder. These files are said to have been downloaded from victims’ email inboxes, with the ultimate goal of stealing diplomatic documents. The documents were then leaked to an attacker-controlled server using the Rclone utility.

“Ashen Lepus continues to conduct espionage operations and has demonstrated a clear intent to continue operating throughout recent regional conflicts, unlike other related threat groups whose activity has significantly decreased,” the company concluded. “Threat actors’ activities over the past two years particularly highlight their continued intelligence gathering efforts.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePort raises $100M at $800M valuation to take on Spotify’s Backstage
Next Article Winter Solstice 2025: The Ultimate Guide to the Shortest Day of the Year
user
  • Website

Related Posts

Iran’s Infy APT resurfaces with new malware activity after years of silence

December 21, 2025

US Department of Justice charges $54 for ATM jackpotting scheme using Ploutus malware

December 20, 2025

Russian-linked hackers use Microsoft 365 device code phishing to take over accounts

December 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Waymo temporarily suspends service in San Francisco as robotaxis stall due to power outage

Iran’s Infy APT resurfaces with new malware activity after years of silence

Google and Apple reportedly warned employees with visas to avoid traveling abroad

‘It felt so wrong’: Colin Angle on iRobot, the FTC, and the Amazon deal that never was

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.