This sneaky malware lay undetected for five years to target government devices

security
(Image credit: Shutterstock / Sashkin)

Cybersecurity researchers have spotted new threat actors targeting government, aviation, education, and telecoms firms. 

A report from Symantec outlined a group they dubbed Lancefly was spotted using a custom piece of malware to target the abovementioned organizations. Lancefly is using a custom infostealer called Merdoor which, according to the researchers, has been circulating since at least 2018. The researchers spotted it in certain campaigns back in 2020 and 2021, but for this specific campaign, the malware’s been in use since mid-2022 and continued into 2023.

Symantec’s experts are claiming that the attackers aren’t casting a wide net with Merdoor, but are rather quite picky with their targets. “Only a small number of machines [are] infected,” they said.

The Merdoor malware

Merdoor comes with a number of functions, including installing itself as a service, keylogging, different means of communication with the C2 server (HTTP, HTTPS, DNS, etc.), and the ability to listen on a local port for commands.

While evidence from previous campaigns suggests Lancefly uses classic phishing techniques to distribute the backdoor to endpoints, for this specific campaign, the infection vector wasn’t clear, the researchers said. In one instance, the attackers seem to have used SSH brute-forcing. In another instance, a load balancer may have been exploited for access.

“While evidence for any of these infection vectors is not definitive, it does appear to indicate that Lancefly is adaptable when it comes to the kind of infection vectors it uses,” the researchers concluded. 

The identity of the group remains a mystery, although the researchers did suggest that they might be Chinese. In its campaigns, Lancefly uses ZXSHell rootkit, which is signed by the certificate “Wemade Entertainment Co. Ltd”. This certificate is being linked to Blackfly (AKA APT41), a Chinese threat actor. However, this group is known for sharing its certificates with other threat actors.

Wherever the group is from, one thing is for certain - the goal of its campaign is espionage and intelligence gathering.

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
China
Chinese hackers develop effective new hacking technique to go after business networks
An American flag flying outside the US Capitol building against a blue sky
US military and defense contractors hit with Infostealer malware
A computer being guarded by cybersecurity.
Huge cyberattack found hitting vulnerable Microsoft-signed legacy drivers to get past security
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Juniper VPN gateways targeted by stealthy "magic" malware
A digital representation of a lock
Security experts are being targeted with fake malware discoveries
A group of 7 hackers, 6 slightly blurred in the background and one in the foreground, all wearing black with hoods pulled up over their heads. You cannot see their faces. The hacker in the foreground sits with an open laptop in front of them. The background, behind the hackers, is a Chinese flag
China government-linked hackers caught running a seriously dangerous ransomware scam
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)