By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023
Computing

China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023

News Room
Last updated: 2026/01/27 at 9:14 AM
News Room Published 27 January 2026
Share
China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023
SHARE

Ravie LakshmananJan 27, 2026Web Security / Malware

Cybersecurity researchers have discovered a JScript-based command-and-control (C2) framework called PeckBirdy that has been put to use by China-aligned APT actors since 2023 to target multiple environments.

The flexible framework has been put to use against Chinese gambling industries and malicious activities targeting Asian government entities and private organizations, according to Trend Micro.

“PeckBirdy is a script-based framework which, while possessing advanced capabilities, is implemented using JScript, an old script language,” researchers Ted Lee and Joseph C Chen said. “This is to ensure that the framework could be launched across different execution environments via LOLBins (living-off-the-land binaries).”

The cybersecurity company said it identified the PeckBirdy script framework in 2023 after it observed multiple Chinese gambling websites being injected with malicious scripts, which are designed to download and execute the primary payload in order to facilitate the remote delivery and execution of JavaScript.

The end goal of this routine is to serve fake software update web pages for Google Chrome so as to trick users into downloading and running bogus update files, thereby infecting the machines with malware in the process. This activity cluster is being tracked as SHADOW-VOID-044.

Cybersecurity

SHADOW-VOID-044 is one of the two temporary intrusion sets detected using PeckBirdy. The second campaign, observed first in July 2024 and referred to as SHADOW-EARTH-045, involves targeting Asian government entities and private organizations — including a Philippine educational institution — injecting PeckBirdy links into government websites to likely serve scripts for credential harvesting on the website.

“In one case, the injection was on a login page of a government system, while in another incident, we noticed the attacker using MSHTA to execute PeckBirdy as a remote access channel for lateral movement in a private organization,” Trend Micro said. “The threat actor behind the attacks also developed a .NET executable to launch PeckBirdy with ScriptControl. These findings demonstrate the versatility of PeckBirdy’s design, which enables it to serve multiple purposes.”

What makes PeckBirdy notable is its flexibility, allowing it to run with varying capabilities across web browsers, MSHTA, WScript, Classic ASP, Node JS, and .NET (ScriptControl). The framework’s server is configured to support multiple APIs that make it possible for clients to obtain landing scripts for different environments via an HTTP(S) query.

The API paths include an “ATTACK ID” value — a random but predefined string with 32 characters (e.g., o246jgpi6k2wjke000aaimwбe7571uh7) — that determines the PeckBirdy script to be retrieved from the domain. Once launched, the PeckBirdy determines the current execution context and then proceeds to generate a unique victim ID and persist it for subsequent executions.

The initialization step is followed by the framework attempting to figure out what communication methods are supported in the environment. PeckBirdy uses the WebSocket protocol to communicate with the server by default. However, it can also employ Adobe Flash ActiveX objects or Comet as a fallback mechanism.

After a connection has been initiated with the remote server, passing along the ATTACK ID and victim ID values, the server responds with a second-stage script, one of which is capable of stealing website cookies. One of PeckBirdy’s servers associated with the SHADOW-VOID-044 campaign has been found to host additional scripts –

  • An exploitation script for a Google Chrome flaw in the V8 engine (CVE-2020-16040, CVSS score: 6.5) that was patched in December 2020
  • Scripts for social engineering pop-ups that are designed to trick victims into downloading and executing malicious files
  • Scripts for delivering backdoors that are executed via Electron JS
  • Scripts to establish reverse shells via TCP sockets

Further infrastructure analysis has led to the identification of two backdoors dubbed HOLODONUT and MKDOOR –

  • HOLODONUT, a .NET-based modular backdoor that’s launched using a simple downloader named NEXLOAD and is capable of loading, running, or removing different plugins received from the server
  • MKDOOR, a modular backdoor that’s capable of loading, running, or uninstalling different modules received from the server
Cybersecurity

It’s suspected that SHADOW-VOID-044 and SHADOW-EARTH-045 could be linked to different China-aligned nation-state actors. This assessment is based on the following clues –

  • The presence of GRAYRABBIT, a backdoor previously deployed by UNC3569 alongside DRAFTGRAPH and Crosswalk following the exploitation of N-day security flaws, on a server operated by SHADOW-VOID-044
  • HOLODONUT is said to share links to another backdoor, WizardNet, which is attributed to TheWizards
  • A Cobalt Strike artifact hosted on the SHADOW-VOID-044 server that’s signed using a certificate that was also used in a 2021 BIOPASS RAT campaign aimed at online gambling companies in China via a watering hole attack
  • Similarities between BIOPASS RAT and MKDOOR, both of which open an HTTP server on a high-numbered port on the local host to listen (The BIOPASS RAT is attributed to a threat actor known as Earth Lusca, aka Aquatic Panda or RedHotel)
  • SHADOW-EARTH-045’s use of 47.238.184[.]9 – an IP address previously linked to Earth Baxia and APT41 – to downloaded files

“These campaigns a dynamic JavaScript framework, PickBirdy, to abuse living-off-the-land binaries and deliver modular backdoors such as MKDOOR and HOLODONUT,” Trend Micro concluded. “Detecting malicious JavaScript frameworks remains a significant challenge due to their use of dynamically generated, runtime-injected code and the absence of persistent file artifacts, enabling them to evade traditional endpoint security controls.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article China’s Moonshot releases a new open-source model Kimi K2.5 and a coding agent |  News China’s Moonshot releases a new open-source model Kimi K2.5 and a coding agent | News
Next Article How to customize the iPhone Action Button and make it work better for you How to customize the iPhone Action Button and make it work better for you
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Dragon Ball Super Returns! Here’s How to Watch All the Shows, Movies (in Order)
Dragon Ball Super Returns! Here’s How to Watch All the Shows, Movies (in Order)
News
EXCLUSIVE: Intel confirms XeSS 3 is coming to Arc B580 next month — and it’s now my top GPU recommendation
EXCLUSIVE: Intel confirms XeSS 3 is coming to Arc B580 next month — and it’s now my top GPU recommendation
News
Orchestrate Brings Communication Orchestration to Life
Orchestrate Brings Communication Orchestration to Life
Computing
Android 16’s New Theft Protection Features: Harder To Break In, Easier To Lock Down – BGR
Android 16’s New Theft Protection Features: Harder To Break In, Easier To Lock Down – BGR
News

You Might also Like

Orchestrate Brings Communication Orchestration to Life
Computing

Orchestrate Brings Communication Orchestration to Life

4 Min Read
I Built a “Baby Algorithm” to Cure My Decision Fatigue (And Save My Relationship) | HackerNoon
Computing

I Built a “Baby Algorithm” to Cure My Decision Fatigue (And Save My Relationship) | HackerNoon

6 Min Read
Systemd Founder Lennart Poettering Announces Amutable Company
Computing

Systemd Founder Lennart Poettering Announces Amutable Company

2 Min Read
ByteDance prefers shut down of TikTok to a forced sale: report · TechNode
Computing

ByteDance prefers shut down of TikTok to a forced sale: report · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?