By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: MirrorFace Targets Japan and Taiwan with ROAMINGMOUSE and Upgraded ANEL Malware
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > MirrorFace Targets Japan and Taiwan with ROAMINGMOUSE and Upgraded ANEL Malware
Computing

MirrorFace Targets Japan and Taiwan with ROAMINGMOUSE and Upgraded ANEL Malware

News Room
Last updated: 2025/05/08 at 8:07 AM
News Room Published 8 May 2025
Share
SHARE

May 08, 2025Ravie LakshmananMalware / Cyber Espionage

The nation-state threat actor known as MirrorFace has been observed deploying malware dubbed ROAMINGMOUSE as part of a cyber espionage campaign directed against government agencies and public institutions in Japan and Taiwan.

The activity, detected by Trend Micro in March 2025, involved the use of spear-phishing lures to deliver an updated version of a backdoor called ANEL.

“The ANEL file from the 2025 campaign discussed in this blog implemented a new command to support an execution of BOF (Beacon Object File) in memory,” security researcher Hara Hiroaki said. “This campaign also potentially leveraged SharpHide to launch the second stage backdoor NOOPDOOR.”

The China-aligned threat actor, also known as Earth Kasha, is assessed to be a sub-cluster within APT10. In March 2025, ESET shed light on a campaign referred to as Operation AkaiRyū that targeted a diplomatic organization in the European Union in August 2024 with ANEL (aka UPPERCUT).

Cybersecurity

The targeting of various Japanese and Taiwanese entities points to a continued expansion of their footprint, as the hacking crew seeks to conduct information theft to advance their strategic objectives.

The attack starts with a spear-phishing email — some of which are sent from legitimate-but-compromised accounts — that contains an embedded Microsoft OneDrive URL, which, in turn, downloads a ZIP file.

The ZIP archive includes a malware-laced Excel document, and a macro-enabled dropper codenamed ROAMINGMOUSE that serves as a conduit to deliver components related to ANEL. It’s worth noting that ROAMINGMOUSE has been put to use by MirrorFace since last year.

“ROAMINGMOUSE then decodes the embedded ZIP file by using Base64, drops the ZIP on a disk, and expands its components,” Hiroaki said. This includes –

  • JSLNTOOL.exe, JSTIEE.exe, or JSVWMNG.exe (a legitimate binary)
  • JSFC.dll (ANELLDR)
  • An encrypted ANEL payload
  • MSVCR100.dll (a legitimate DLL dependency of the executable)

The end goal of the attack chain is to launch the legitimate executable using explorer.exe and then use it to sideload the malicious DLL, in this case, ANELLDR, which is responsible for decrypting and launching the ANEL backdoor.

What’s notable about the ANEL artifact used in the 2025 campaign is the addition of a new command to support in-memory execution of beacon object files (BOFs), which are compiled C programs designed to extend the Cobalt Strike agent with new post-exploitation features.

“After installing the ANEL file, actors behind Earth Kasha obtained screenshots using a backdoor command and examined the victim’s environment,” Trend Micro explained. “The adversary appears to investigate the victim by looking through screenshots, running process lists, and domain information.”

Cybersecurity

Select instances have also leveraged an open-source tool named SharpHide to launch a new version of NOOPDOOR (aka HiddenFace), another backdoor previously identified as used by the hacking group. The implant, for its part, supports DNS-over-HTTPS (DoH) to conceal its IP address lookups during command-and-control (C2) operations.

“Earth Kasha continues to be an active advanced persistent threat and is now targeting government agencies and public institutions in Taiwan and Japan in its latest campaign which we detected in March 2025,” Hiroaki said.

“Enterprises and organizations, especially those with high-value assets like sensitive data relating to governance, as well as intellectual property, infrastructure data, and access credentials should continue to be vigilant and implement proactive security measures to prevent falling victim to cyber attacks.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article You can now submit your claims for Apple’s $95 million Siri spying settlement
Next Article Using Social Drivers to Improve Software Engineering Team Performance
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Democrats block stablecoin bill in blow to crypto
News
Chinese tea brand Auntea Jenny hopes to list in Hong Kong · TechNode
Computing
Donald Trump’s UK Trade Deal Could Secure Jaguar’s Resurrection
Gadget
Apple’s Gift for Mom’ uses Spatial Video to film a child’s first year
News

You Might also Like

Computing

Chinese tea brand Auntea Jenny hopes to list in Hong Kong · TechNode

1 Min Read
Computing

Uncovering Hidden Bias in Blockchain Transaction Ordering | HackerNoon

12 Min Read
Computing

Intel Begins Posting Linux Patches For Wildcat Lake

2 Min Read
Computing

Chinese automakers Wuling, Changan offer holiday discounts to boost EV demand · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?