Nspx30

Malware updated 15 days ago (2024-11-29T14:48:08.664Z)
Download STIX
Preview STIX
NSPX30 is a sophisticated multistage malware implant that was recently discovered by ESET researchers. Tracing its evolution back to a small backdoor from 2005, named Project Wood, NSPX30 has been linked to the China-aligned APT group Blackwood. The malware uses a unique delivery method, deploying itself through adversary-in-the-middle (AitM) attacks that hijack update requests from legitimate software programs such as Tencent QQ, WPS Office, and Sogou Pinyin. This approach allows the attackers to inject their backdoor into these systems without using common infection methods like phishing or infected webpages. However, the exact tool enabling the initial compromise of targets remains unknown. The malware consists of several components including a dropper, an installer, loaders, an orchestrator, and a backdoor. Its design revolves around the attackers' ability to conduct packet interception, which helps them hide their infrastructure. Once installed, NSPX30 can perform various malicious activities, such as establishing a reverse shell, adding itself to allowlists in Chinese antivirus tools, and intercepting network traffic. Despite these capabilities, the full extent of what this multistage implant is made up of remains unclear. Given the threat posed by NSPX30, it's critical for organizations to ensure their endpoint protection tools are capable of blocking this malware. Senior malware researcher at ESET, Mathieu Tartare, advises vigilance towards malware detections related to legitimate software systems. As NSPX30 exploits unencrypted HTTP connections to inject its backdoor during software updates, it's also recommended that software providers switch to encrypted HTTPS connections to mitigate such threats.
Description last updated: 2024-11-28T11:56:46.760Z
What's your take? (Question 1 of 4)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Backdoor
Eset
Implant
AITM
Dropper
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Nspx30 Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more