Loading...

DLL Hijacking Exploited by New PlugX Variant

Threat Overview

A recent threat report published by AlienVault on September 25, 2025, reveals a new campaign targeting telecommunications and manufacturing sectors in Central and South Asian countries. This campaign delivers a novel variant of the PlugX malware, which has been active since 2022. The report highlights significant overlaps between RainyDay and Turian backdoors, including the abuse of legitimate applications for DLL sideloading and shared encryption methods.

Campaign Details

The new PlugX variant’s configuration format closely resembles that of RainyDay, suggesting a potential attribution to the Naikon actor group. The analysis of victimology and technical implementation indicates a possible connection between Naikon and BackdoorDiplomacy, possibly sourcing tools from the same vendor. This campaign underscores the evolving tactics of Chinese-speaking threat actors and the potential collaboration between previously distinct groups.

Technical Analysis

The malware families involved in this campaign use similar infection chains, loaders, and shellcode structures. They also share RC4 keys for payload decryption, which further supports the hypothesis of a common origin or shared toolset. The abuse of DLL search order hijacking is a notable tactic employed by these threat actors to execute malicious code.

DLL Search Order Hijacking

DLL search order hijacking is a technique where an attacker exploits the way Windows searches for dynamic-link libraries (DLLs). By placing a malicious DLL in a directory that is searched before the legitimate one, attackers can execute arbitrary code. This method is particularly effective because it leverages legitimate applications to bypass security measures.

Recommendations

To mitigate the risks associated with this campaign, organizations should consider the following recommendations:

  • Patch Management: Ensure that all systems and applications are up-to-date with the latest security patches. This includes both operating systems and third-party software.
  • Application Whitelisting: Implement application whitelisting to prevent unauthorized software from executing. This can help block malicious DLLs from being loaded.
  • Monitoring and Detection: Use advanced threat detection tools to monitor for suspicious activities, such as unusual DLL loading behavior. Regularly review logs and alerts generated by these tools.
  • User Education: Train employees on recognizing phishing attempts and other social engineering tactics that may be used to deliver malware.
  • Network Segmentation: Segment the network to limit the spread of malware in case of a breach. Critical systems should be isolated from less secure parts of the network.

Conclusion

The discovery of this new PlugX variant and its connections to RainyDay and Turian backdoors highlight the sophisticated tactics employed by Chinese-speaking threat actors. Organizations, particularly those in the telecommunications and manufacturing sectors, must remain vigilant and implement robust security measures to protect against these evolving threats.

References

For more detailed information, please refer to the following external references:

Leave a Reply

Looking for the Best Cyber Security?

Seamlessly integrate local and cloud resources with our comprehensive cybersecurity services. Protect user traffic at endpoints using advanced security solutions like threat hunting and endpoint protection. Build a scalable network infrastructure with continuous monitoring, incident response, and compliance assessments.

Contact Us

Copyright © 2025 ESSGroup

Discover more from ESSGroup

Subscribe now to keep reading and get access to the full archive.

Continue reading