Sunday, June 29, 2025
Google search engine
HomeTechnologyCyber SecurityHackers abuse IPv6 networking function to hijack software program updates

Hackers abuse IPv6 networking function to hijack software program updates


A China-aligned APT risk actor named “TheWizards” abuses an IPv6 networking function to launch adversary-in-the-middle (AitM) assaults that hijack software program updates to put in Home windows malware.

In keeping with ESET, the group has been energetic since at the least 2022, focusing on entities within the Philippines, Cambodia, the United Arab Emirates, China, and Hong Kong. Victims embrace people, playing corporations, and different organizations.

The assaults make the most of a customized instrument dubbed “Spellbinder” by ESET that abuses the IPv6 Stateless Deal with Autoconfiguration (SLAAC) function to conduct SLACC assaults.

SLAAC is a function of the IPv6 networking protocol that enables units to routinely configure their very own IP addresses and default gateway without having a DHCP server. As a substitute, it makes use of Router Commercial (RA) messages to obtain IP addresses from IPv6-supported routers.

The hacker’s Spellbinder instrument abuses this function by sending spoofed RA messages over the community, inflicting close by methods to routinely obtain a brand new IPv6 IP deal with, new DNS servers, and a brand new, most well-liked IPv6 gateway.

This default gateway, although, is the IP deal with of the Spellbinder instrument, which permits it to intercept communications and reroute site visitors via attacker-controlled servers.

“Spellbinder sends a multicast RA packet each 200 ms to ff02::1 (“all nodes”); Home windows machines within the community with IPv6 enabled will autoconfigure by way of stateless deal with autoconfiguration (SLAAC) utilizing data supplied within the RA message, and start sending IPv6 site visitors to the machine operating Spellbinder, the place packets will probably be intercepted, analyzed, and replied to the place relevant,” explains ESET.

Abusing IPv6 SLAAC using the Spellbinder toolAbusing IPv6 SLAAC utilizing the Spellbinder instrument
Supply: ESET

ESET stated assaults deploy Spellbinder utilizing an archive named AVGApplicationFrameHostS.zip, which extracts right into a listing mimicking legit software program: “%PROGRAMFILESpercentAVG Applied sciences.”

Inside this listing are AVGApplicationFrameHost.exe, wsc.dll, log.dat, and a legit copy of winpcap.exe. The WinPcap executable is used to side-load the malicious wsc.dll, which hundreds Spellbinder into reminiscence.

As soon as a tool is contaminated, Spellbinder begins capturing and analyzing community site visitors trying to attach particular domains, akin to these associated to Chinese language software program replace servers.

ESET says the malware displays for domains belonging to the next corporations: Tencent, Baidu, Xunlei, Youku, iQIYI, Kingsoft, Mango TV, Funshion, Yuodao, Xiaomi, Xiaomi Miui, PPLive, Meitu, Quihoo 360, and Baofeng.

The instrument then redirects these requests to obtain and set up malicious updates that deploy a backdoor named “WizardNet.”

The WizardNet backdoor provides attackers persistent entry to the contaminated gadget and permits them to put in further malware as wanted.

To guard towards most of these assaults, organizations can monitor IPv6 site visitors or flip off the protocol if it isn’t required of their atmosphere.

In January, ESET additionally reported on one other hacking group named “Blackwood” hijacking the WPS Workplace software program replace function to put in malware.


Red Report 2025

Primarily based on an evaluation of 14M malicious actions, uncover the highest 10 MITRE ATT&CK strategies behind 93% of assaults and how you can defend towards them.

Learn the Crimson Report 2025



Supply hyperlink

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments