Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Zardoor Backdoor Targets Islamic Charity with Advanced Evasion Techniques
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Zardoor Backdoor Targets Islamic Charity with Advanced Evasion Techniques

Highlights

  • Zardoor malware backdoor targets charity.

  • Uses proxy tools for stealth and persistence.

  • Analysis by Talos reveals technical details.

NEWSLINKER
Last updated: 12 February, 2024 - 10:45 am 10:45 am
NEWSLINKER 1 year ago
Share
SHARE

A recent cyberespionage campaign has introduced a new malware backdoor, referred to as “Zardoor,” targeting an Islamic non-profit organization. Cybersecurity experts have been monitoring the campaign’s activity which is speculated to have Chinese origins. This sophisticated malware uses a variety of methods to avoid detection while establishing long-term access within compromised networks.

Contents
Advanced Infiltration and Persistence StrategiesComplex Execution Mechanism of Zardoor

Advanced Infiltration and Persistence Strategies

Zardoor employs several advanced strategies to infiltrate systems and evade traditional security measures. The malware makes use of reverse proxy tools, such as Fast Reverse Proxy (FRP), sSocks, and Venom. These tools are often favored by penetration testers and help the malware to remain undetected while establishing a presence within the target system. To move laterally and propagate, the threat actors utilize native Windows tools, exploiting the Windows Management Instrumentation.

Complex Execution Mechanism of Zardoor

This malware is built to ensure persistent unauthorized access to victim networks. It leverages multiple Dynamic Link Library (DLL) files, including “zar32.dll” for communication with the command and control (C2) server and “zor32.dll” to confirm adequate privilege levels for the main backdoor component. The exact means of initial deployment remains unidentified, though the dropper is designed to manipulate the “msdtc.exe” process to load a malicious payload known as “oci.dll.”

The execution process involves the service ‘ServiceMain()’ that triggers the ‘msdtc.exe’ to load the “zar32.dll” using a specific command. Simultaneously, “zor32.dll” gets loaded using a similar command, ensuring both components are active and operating in tandem.

Once the connection is established, the “zar32.dll” can carry out various commands from the C2, ranging from encrypting and sending data, to executing payloads and remote shellcode, and even self-deletion to avoid tracing.

Talos, a cybersecurity firm, has provided an in-depth analysis of Zardoor’s source code, mechanisms, and behaviors. This comprehensive insight into the malware’s technical workings is available on their platform.

Cybersecurity vigilance is essential as sophisticated threats like Zardoor emerge. Staying informed about the latest security news and insights can help organizations protect their networks from these advanced cyber threats.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

FTC Seeks New Tools to Combat Deepfake Pornography

Cyberattacks Exploit Major Software Vulnerabilities, Affecting Global Infrastructure

North Korea Builds Cyber Network Resembling a Mafia Operation

Cybercriminals Invest Illicit Profits in Surprising Ventures

DHS Faces Scrutiny for Withholding CISA Workforce Details

Share This Article
Facebook Twitter Copy Link Print
By NEWSLINKER
NEWS LINKER is your premier source for the latest in business, finance, science, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Dive deep into the world of cutting-edge developments, breakthroughs, market trends, and game-changing innovations..
Previous Article Hubble Space Telescope Captures Distant Irregular Galaxy ESO 245-5
Next Article Pre-Reservation for Samsung Galaxy Book 4 Series Kicks Off in India

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Wordle Challenges Players with Tricky Puzzle
Gaming
Huawei Unveils New Smart Watch With Health Tracking Features
Wearables
Elon Musk Responds to Complaints About Tesla Driver Monitoring
Electric Vehicle
Enhancements in Tesla’s Model Y Boost In-Cabin Safety
Electric Vehicle
British Financier Launches Ambitious Animal Communication Initiative
AI Technology
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?