By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor
Computing

WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor

News Room
Last updated: 2025/12/11 at 6:38 AM
News Room Published 11 December 2025
Share
WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor
SHARE

Dec 11, 2025Ravie LakshmananCyberwarfare / Threat Intelligence

An advanced persistent threat (APT) known as WIRTE has been attributed to attacks targeting government and diplomatic entities across the Middle East with a previously undocumented malware suite dubbed AshTag since 2020.

Palo Alto Networks is tracking the activity cluster under the name Ashen Lepus. Artifacts uploaded to the VirusTotal platform show that the threat actor has trained its sights on Oman and Morocco, indicating an expansion in operational scope beyond the Palestinian Authority, Jordan, Iraq, Saudi Arabia, and Egypt.

“Ashen Lepus remained persistently active throughout the Israel-Hamas conflict, distinguishing it from other affiliated groups whose activities decreased over the same period,” the cybersecurity company said in a report shared with The Hacker News. “Ashen Lepus continued with its campaign even after the October 2025 Gaza ceasefire, deploying newly developed malware variants and engaging in hands-on activity within victim environments.”

Cybersecurity

WIRTE, which overlaps with an Arabic-speaking, politically motivated cluster known as Gaza Cyber Gang (aka Blackstem, Extreme Jackal, Molerats, or TA402), is assessed to be active since at least 2018. According to a report from Cybereason, both Molerats and APT-C-23 (aka Arid Viper, Desert Varnish, or Renegade Jackal) are two main sub-groups of the Hamas cyberwarfare division.

It’s primarily driven by espionage and intelligence collection, targeting government entities in the Middle East to meet its strategic objectives.

In a report published in November 2024, Check Point attributed the hacking crew to destructive attacks exclusively aimed at Israeli entities to infect them with a custom wiper malware referred to as SameCoin, highlighting their ability to adapt and carry out both espionage and sabotage.

The long-running, elusive campaign detailed by Unit 42, going all the way back to 2018, has been found to leverage phishing emails with lures related to geopolitical affairs in the region. A recent increase in lures related to Turkey – e.g., “Partnership agreement between Morocco and Turkey” or “Draft resolutions concerning the State of Palestine” – suggests that entities in the country may be a new area of focus.

The attack chains commence with a harmless PDF decoy that tricks recipients into downloading a RAR archive from a file-sharing service. Opening the archive triggers a chain of events that results in the deployment of AshTag.

This involves using a renamed benign binary to sideload a malicious DLL dubbed AshenLoader that, in addition to opening a decoy PDF file to keep up the ruse, contacts an external server to drop two more components, a legitimate executable and a DLL payload called AshenStager (aka stagerx64) that’s again sideloaded to launch the malware suite in memory to minimize forensic artifacts.

AshTag is a modular .NET backdoor that’s designed to facilitate persistence and remote command execution, while masquerading as a legitimate VisualServer utility to fly under the radar. Internally, its features are realized by means of an AshenOrchestrator to enable communications and to run additional payloads in memory.

Cybersecurity

These payloads serve different purposes –

  • Persistence and process management
  • Update and removal
  • Screen capture
  • File explorer and management
  • System fingerprinting

In one case, Unit 42 said it observed the threat actor accessing a compromised machine to conduct hands-on data theft by staging documents of interest in the C:UsersPublic folder. These files are said to have been downloaded from a victim’s email inbox, their end goal being the theft of diplomacy-related documents. The documents were then exfiltrated to an attacker-controlled server using the Rclone utility.

“Ashen Lepus remains a persistent espionage actor, demonstrating a clear intent to continue its operations throughout the recent regional conflict — unlike other affiliated threat groups, whose activity significantly decreased,” the company concluded. “The threat actors’ activities throughout the last two years in particular highlight their commitment to constant intelligence collection.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Your Ring Doorbell can now recognise visitors if you’re in the US Your Ring Doorbell can now recognise visitors if you’re in the US
Next Article December 10, 2025 – The best iPhone apps and games of the year December 10, 2025 – The best iPhone apps and games of the year
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Final Audio ends the year with two new wireless gaming headsets
Final Audio ends the year with two new wireless gaming headsets
Gadget
Opera Neon Browser Drops Waitlist, Adds Deep Research Agent
Opera Neon Browser Drops Waitlist, Adds Deep Research Agent
News
Ex-CNN anchor launches AI prompt library to cut Africa’s PR costs
Ex-CNN anchor launches AI prompt library to cut Africa’s PR costs
Computing
Zilch secures FCA licence ahead of payments product launch – UKTN
Zilch secures FCA licence ahead of payments product launch – UKTN
News

You Might also Like

Ex-CNN anchor launches AI prompt library to cut Africa’s PR costs
Computing

Ex-CNN anchor launches AI prompt library to cut Africa’s PR costs

4 Min Read
How To Start A Print On Demand Business: A Step-By-Step Guide
Computing

How To Start A Print On Demand Business: A Step-By-Step Guide

28 Min Read
11 ChatGPT Prompts for LinkedIn to Create Content in Minutes – The Gain Blog
Computing

11 ChatGPT Prompts for LinkedIn to Create Content in Minutes – The Gain Blog

14 Min Read
Swift’s #Predicate Explained: How Type-Safe Filtering Works in SwiftData | HackerNoon
Computing

Swift’s #Predicate Explained: How Type-Safe Filtering Works in SwiftData | HackerNoon

0 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?