By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea
Computing

New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea

News Room
Last updated: 2025/11/03 at 6:13 AM
News Room Published 3 November 2025
Share
New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea
SHARE

Nov 03, 2025Ravie LakshmananCybersecurity / Malware

The North Korea-linked threat actor known as Kimsuky has distributed a previously undocumented backdoor codenamed HttpTroy as part of a likely spear-phishing attack targeting a single victim in South Korea.

Gen Digital, which disclosed details of the activity, did not reveal any details on when the incident occurred, but noted that the phishing email contained a ZIP file (“250908_A_HK이노션_SecuwaySSL VPN Manager U100S 100user_견적서.zip”), which masqueraded as a VPN invoice to distribute malware capable of file transfer, capturing screenshots, and executing arbitrary commands.

“The chain has three steps: a small dropper, a loader called MemLoad, and the final backdoor, named ‘HttpTroy,'” security researcher Alexandru-Cristian Bardaș said.

Present within the ZIP archive is a SCR file of the same name, opening which triggered the execution chain, starting with a Golang binary containing three embedded files, including a decoy PDF document that’s displayed to the victim to avoid raising any suspicion.

DFIR Retainer Services

Also launched simultaneously in the background is MemLoad, which is responsible for setting up persistence on the host by means of a scheduled task named “AhnlabUpdate,” an attempt to impersonate AhnLab, a South Korean cybersecurity company, and decrypt and execute the DLL backdoor (“HttpTroy”).

The implant allows the attackers to gain complete control over the compromised system, enabling file upload/download, screenshot capture, command execution with elevated privileges, in-memory loading of executables, reverse shell, process termination, and trace removal. It communicates with the command-and-control (C2) server (“load.auraria[.]org”) over HTTP POST requests.

“HttpTroy employs multiple layers of obfuscation to hinder analysis and detection,” Bardaș explained. “API calls are concealed using custom hashing techniques, while strings are obfuscated through a combination of XOR operations and SIMD instructions. Notably, the backdoor avoids reusing API hashes and strings. Instead, it dynamically reconstructs them during runtime using varied combinations of arithmetic and logical operations, further complicating static analysis.”

The findings come as the cybersecurity vendor also detailed a Lazarus Group attack that led to the deployment of Comebacker and an upgraded version of its BLINDINGCAN (aka AIRDRY or ZetaNile) remote access trojan. The attack targeted two victims in Canada and was detected in the “middle of the attack chain,” it added.

While the exact initial access vector used in the attack is not known, it’s assessed to be a phishing email based on the absence of any known security vulnerabilities that could have been exploited to gain a foothold.

Two different variants of Comebacker – one as a DLL and another as an EXE – have been put to use, with the former launched via a Windows service and the latter through “cmd.exe.” Irrespective of the method used to execute them, the end goal of the malware is the same: to decrypt an embedded payload (i.e., BLINDINGCAN) and deploy it as a service.

CIS Build Kits

BLINDINGCAN is designed to establish a connection with a remote C2 server (“tronracing[.]com”) and await further instructions that allow it to –

  • Upload/download files
  • Delete files
  • Alter a file’s attributes to mimic another file
  • Recursively enumerate all files and sub-directories for a specified path
  • Gather data about files across the entire file system
  • Collect system metadata
  • List running processes
  • Run a command-line using CreateProcessW
  • Execute binaries directly in memory
  • Execute commands using “cmd.exe”
  • Terminate a specific process by passing a process ID as input
  • Take screenshots
  • Take pictures from the available video capture devices
  • Update configuration
  • Change current working directory
  • Delete itself and remove all traces of malicious activity

“Kimsuky and Lazarus continue to sharpen their tools, showing that DPRK-linked actors aren’t just maintaining their arsenals, they’re reinventing them,” Gen Digital said. “These campaigns demonstrate a well-structured and multi-stage infection chain, leveraging obfuscated payloads and stealthy persistence mechanisms.”

“From the initial stages to the final backdoors, each component is designed to evade detection, maintain access and provide extensive control over the compromised system. The use of custom encryption, dynamic API resolution and COM-based task registration/services exploitation highlights the groups’ continued evolution and technical sophistication.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Tesla to offer Full Self-Driving gifting program: here’s how it will work Tesla to offer Full Self-Driving gifting program: here’s how it will work
Next Article Google Photos’ Ask Photos could soon make searching memories even easier Google Photos’ Ask Photos could soon make searching memories even easier
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

F1 decides what driver radio clips you hear. The process is always changing
Software
Trump’s CZ Pardon Has the Crypto World Bracing for Impact
Trump’s CZ Pardon Has the Crypto World Bracing for Impact
Gadget
Best robot vacuum deal: Save 0 on Shark AI Ultra
Best robot vacuum deal: Save $300 on Shark AI Ultra
News
Microsoft to ship 60,000 Nvidia AI chips to UAE under US-approved deal
News

You Might also Like

LangChain vs LangGraph: A Beginner’s Guide to Building Smarter AI Workflows | HackerNoon
Computing

LangChain vs LangGraph: A Beginner’s Guide to Building Smarter AI Workflows | HackerNoon

11 Min Read
NCBA works to restore M-Shwari after outage locked customers out of savings
Computing

NCBA works to restore M-Shwari after outage locked customers out of savings

4 Min Read
The HackerNoon Newsletter: Fortune Folly (11/3/2025) | HackerNoon
Computing

The HackerNoon Newsletter: Fortune Folly (11/3/2025) | HackerNoon

3 Min Read
Esports teams in South Africa are turning play into profit
Computing

Esports teams in South Africa are turning play into profit

10 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?