Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
Home/Threats/Sandworm SSH-over-Tor Tunnel for Hidden Persistence
Threats

Sandworm SSH-over-Tor Tunnel for Hidden Persistence

The state-sponsored threat group Sandworm, also tracked as APT-C-13 and FROZENBARENTS, has launched a targeted cyberattack campaign. This campaign employs a combined SSH and Tor tunneling technique...

Jennifer sherman
Jennifer sherman
April 28, 2026 3 Min Read
0 0

The state-sponsored threat group Sandworm, also tracked as APT-C-13 and FROZENBARENTS, has launched a targeted cyberattack campaign. This campaign employs a combined SSH and Tor tunneling technique to maintain long-term, hidden access inside victim networks.

This campaign marks a clear upgrade from the group’s earlier intrusion tactics, shifting from simple malware callbacks toward a fully anonymous, encrypted remote control system capable of operating quietly behind enterprise firewalls.

The group has been active since at least 2014, primarily targeting government agencies, diplomatic departments, energy companies, and research organizations to steal political, military, and technological intelligence.

In this latest campaign, the attackers refined their methods by deploying dual-layer anonymous tunnels designed to blend into normal network traffic.

The infection begins with a spear-phishing email carrying a ZIP archive that, once opened, silently installs malicious tools while showing a legitimate-looking decoy document to keep the victim unaware.

Researchers at 360 Advanced Threat Research Institute identified multiple malicious samples tied to this campaign, noting that the group used SSH and Tor nested tunneling to build a double-encrypted anonymous channel between the attacker and the compromised host.

This architecture gave attackers unrestricted access to victim systems, allowing them to extract sensitive data without triggering standard traffic inspection tools or raising alerts from network monitoring systems.

The attack samples were delivered inside a ZIP archive named Iskhod_7582_Predstavlenie_na_naznachenie.zip with an MD5 hash of 2156c270ffe8e4b23b67efed191b9737.

Inside this archive, the group hid a malicious LNK shortcut disguised as a PDF document alongside a fake folder called $RECYCLE.BIN set to mimic the Windows Recycle Bin directory.

Attack flow (Source - 360)
Attack flow (Source – 360)

Once the victim clicked the LNK file, the full attack toolkit deployed silently in the background while the real decoy PDF opened to keep the user distracted from the installation.

The overall impact of this attack is severe. Once the toolkit was in place, attackers gained persistent control over the victim’s internal network, with the ability to move laterally, access sensitive files, and operate the remote desktop.

Critical local ports, including SMB port 445 and RDP port 3389, were mapped to a dark web Onion address, allowing the attacker to connect from anywhere in the world through the Tor network, bypassing all inbound firewall protections.

How Sandworm Achieved Persistent Hidden Access

The most technically notable part of this campaign is how Sandworm embedded long-term access inside victim systems using tools disguised as well-known applications.

After the LNK file triggered the main control script currentSessionTrigger, the script first verified whether it was running on a real machine by checking for at least 10 recent .lnk files and 50 or more active processes.

If the environment passed these checks, the script registered two scheduled tasks named OperagxRepairTask and DropboxRepairTask, both hidden from the default Task Scheduler view, ensuring malicious payloads launched automatically at every user login.

Scheduled Task (Source - 360)
Scheduled Task (Source – 360)

These tasks launched two disguised executables: operagx.exe, which was actually an OpenSSH daemon, and dropbox.exe, which was a Tor server.

A third file, safari.exe, acted as an obfs4 traffic obfuscation plugin, reshaping all Tor traffic into random TCP streams to bypass enterprise firewalls and deep packet inspection systems.

A fourth file, obsstudio.exe, served as an SFTP server for silent file transfers. The SSH daemon was configured to listen only on local loopback port 20321, keeping it invisible to external network scans.

Once the Tor service started, it generated a hidden .onion hostname. The main control script read this hostname and sent the victim’s identity details to a hardcoded C2 address at kvk46su7d2qi6g4n43syp4zbsf2rihnc6ztj77qtc2ojvewjqvqilnqd.onion using curl with high-frequency retry settings to maintain the connection, completing a permanent encrypted shadow control channel inside the victim’s network.

Organizations should regularly audit scheduled tasks for entries impersonating trusted applications like browsers or cloud storage programs.

Security teams should configure firewalls to detect and block Tor-related and obfs4 traffic at the perimeter.

Employees need ongoing training to avoid opening ZIP attachments from unknown senders, especially files with LNK shortcuts disguised as documents.

Deploying endpoint detection tools that identify SSH server processes running from AppData directories with non-standard port configurations is strongly recommended.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarephishingSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

PyPI Package Hacked: Malicious Script Popular With

Next Post

Chinese-Backed Smishing Steals Credentials via OTT

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
China-Aligned Attackers Use ShadowPad, IOX Proxy WMIC Multi-Stage
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us