Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Confucius Shifts from Document Stealers to Python Backdoors
Cyber Security

Confucius Shifts from Document Stealers to Python Backdoors

Team-CWDBy Team-CWDOctober 2, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A long-running cyber-espionage group known as Confucius has introduced new techniques in its campaigns against Microsoft Windows users.

First identified in 2013, the group has consistently targeted government agencies, defense contractors and critical industries across South Asia, particularly in Pakistan.

From Stealers to Python Attacks

According to recent findings from FortiGuard Labs, what’s new is Confucius’ shift from document-focused stealers, such as WooperStealer, to more advanced Python-based backdoors like AnonDoor.

“This latest report from FortiGuard Labs highlights that threat actors are constantly adapting their techniques to stay ahead of the security research community, which develops new techniques to detect them,” said John Bambenek, president at Bambenek Consulting.

“In particular, the use of Python tools exploits the persistent difficulty in detecting malicious activity within scripting languages, where you have a myriad of obfuscation techniques. Python is routinely used everywhere, which means attackers are free to leverage its power without having to install new tools or binaries as well.”

FortiGuard researchers observed multiple attack chains between December 2024 and August 2025.

Early operations relied on spear-phishing with malicious Office documents and LNK files to deliver WooperStealer, a tool that exfiltrated a wide range of sensitive files, including documents, spreadsheets, images and emails.

By mid-2025, however, Confucius adopted a new approach. Instead of relying solely on data theft, the group began deploying the AnonDoor Python backdoor that provides long-term persistence and command execution capabilities. AnonDoor enables actions such as capturing screenshots, listing files, downloading data and dumping browser passwords.

Read more on cyber-espionage in South Asia: 20,000 Asian IPs and Domains Dismantled in Infostealer Crackdown

Evasion and Persistence Techniques

FortiGuard Labs detailed how the group layered multiple methods to achieve persistence and evade detection.

These included:

  • DLL side-loading via legitimate executables

  • Obfuscated PowerShell scripts to install execution environments

  • Scheduled tasks to repeatedly run hidden payloads

  • Stealthy exfiltration routines to minimize network noise

Such methods allowed the group to maintain operational flexibility and avoid security tools that rely on signature-based detection.

Expanding Capabilities

Unlike previous campaigns that focused narrowly on document theft, AnonDoor is capable of full host profiling. It collects system details, geolocates public IPs and inventories disk volumes before receiving tasking from its command-and-control (C2) servers. 

Researchers found that its operations were tailored toward targets in Pakistan, suggesting regionally focused objectives.

“This campaign underscores Confucius’ technical agility,” FortiGuard wrote, noting that the group can quickly pivot between different malware families and delivery methods to sustain access.

The report concludes that Confucius’ layered attack chain demonstrates a clear evolution toward more durable, stealthy espionage operations.

Analysts caution that vigilance against such tactics remains crucial as state-linked groups continue to refine their methods.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticlePhishing Dominates EU-Wide Intrusions, says ENISA
Next Article Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How to help older family members avoid scams

October 31, 2025

Chronology of a Skype attack

February 5, 2026

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.