Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Facebook X (Twitter) Instagram
Sunday, February 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Chinese APT Actor Compromises Military Firm with Novel Fileless Malwar
News

Chinese APT Actor Compromises Military Firm with Novel Fileless Malwar

Team-CWDBy Team-CWDSeptember 11, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A Chinese APT group has compromised a Philippines-based military firm using a novel, sophisticated fileless malware framework dubbed “EggStreme”, Bitdefender researchers have warned.

The multi-stage toolset achieves persistent, low-profile espionage by injecting malicious code directly into memory and leveraging DLL sideloading to execute payloads.

These payloads include a backdoor called “EggStremeAgent”, which enables extensive system reconnaissance, lateral movement and data theft via an injected keylogger.

The researchers said that the modular, fileless and living-off-the-land (LOTL) approach deployed by the framework highlights a significant shift in adversary tradecraft.

“The threat is not a collection of individual executables but a dynamic, multi-stage operation that leverages legitimate tools and system behaviors to remain undetected,” they noted.

The strategic value of the target, its location bounded by the South China Sea, and the tactics used in the attack, are consistent with that of Chinese APT groups.

“The attackers’ primary focus was to achieve persistent access for long-term espionage and surveillance, highlighting the work of a highly professional threat actor whose objectives align with known national interests,” the researchers added.

How the Fileless Malware is Deployed

The Bitdefender report, published on September 10, revealed that the firm’s investigation began in early 2024 after detecting the execution of a logon batch script from an SMB share.

The exact method by which the script was placed on the SMB is unknown.

The script’s primary function was to deploy two files to Windows directory. One of these was a malicious DLL named mscorsvc.dll.

The malicious mscorsvc.dll was the first stage of the attack chain, dubbed “EggStremeFuel,” which sets up the environment for the final payload.

The EggStremeFuel component includes capabilities for system fingerprinting, which allows the attacker to gather information about the compromised machine.

Its most important function is to establish a reverse shell and create a communication channel with the command-and-control (C2) server using read-write pipes. This provides the attacker with a remote command-line interface (CLI) on the compromised system.

The APT actor maintained persistent access by abusing several legitimate Windows services that are not enabled by default. This allowed them to blend into normal system operations while maintaining access.

The attacker then deployed a malicious binary named “EggStremeLoader.” This component is responsible for reading a file that contains both the encrypted “EggStremeReflectiveLoader” and the EggStremeAgent payload.

The final EggStremeAgent implant is a sophisticated backdoor that communicates with the C2 server using the gRPC protocol, an open-source framework for building remote procedure calls (RPCs).

The malware supports 58 distinct commands, including system fingerprinting, privilege escalation, command execution, data exfiltration and process injection.

On several machines, a secondary, more lightweight backdoor was deployed, which is named “EggStremeWizard”. This secondary backdoor provides reverse shell access and file upload/download capabilities.

“The campaign’s success is a direct result of a highly coordinated malware toolkit, not a collection of isolated implants. Each component serves a distinct purpose in the attack chain, from initial execution and persistence to in-memory payload delivery and final remote command and control. A deeper analysis reveals strong ties among the components, suggesting a single, unified development effort,” the researchers noted.

How to Defend Against the EggStreme Toolkit

Bitdefender provided a series of recommendations for security teams to defend against sophisticated fileless malware toolkits such as EggStreme. These include:

  • Limiting the use of legitimate but high-risk binaries to proactively reduce your attack surface
  • Adopting detection and response capabilities to identify complex attack chains and detect behavioral anomalies that bypass prevention layers



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleOpen Source Community Thwarts Massive npm Supply Chain Attack
Next Article France: Three Regional Healthcare Agencies Targeted by Cyber-Attacks
Team-CWD
  • Website

Related Posts

News

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026
News

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026
News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Don’t let “back to school” become “back to bullying”

September 11, 2025

Find your weak spots before attackers do

November 21, 2025

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.