Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
AiTM Phishing Attacks Target SharePoint, HubSpot, Google
May 2, 2026
Home/Threats/APT Hackers Attack RDP Servers to Deploy Malware &
Threats

APT Hackers Attack RDP Servers to Deploy Malware &

Actively targeting Remote Desktop Protocol (RDP) servers, one of the world’s most dangerous state-backed hacking groups has set its sights on critical infrastructure, defense organizations, and...

Sarah simpson
Sarah simpson
March 24, 2026 3 Min Read
0 0

Actively targeting Remote Desktop Protocol (RDP) servers, one of the world’s most dangerous state-backed hacking groups has set its sights on critical infrastructure, defense organizations, and government agencies.

The threat actor, known as APT-C-13 and widely tracked as Sandworm, APT44, Seashell Blizzard, and Voodoo Bear, has long been conducting cyber operations since at least 2009.

Its latest campaign, however, marks a sharp shift in strategy — moving away from destructive, one-time strikes toward quiet, long-term infiltration designed to harvest intelligence over extended periods.

The campaign’s entry point is a disguised ISO image named Microsoft.Office.2025x64.v2025.iso, distributed through Telegram channels and software cracking communities in Ukraine.

When a victim mounts the image and tries to install or activate what appears to be Microsoft Office, hidden executors disguised as auto.exe or setup.exe silently launch in the background.

This social engineering trick works because people naturally trust familiar software names. Once triggered, the initial loader profiles the target system and selectively deploys further malicious modules.

APT-C-13 Attack Chain (Source - Weixin)
APT-C-13 Attack Chain (Source – Weixin)

Weixin analysts at the 360 Threat Intelligence Center identified this campaign and confirmed that APT-C-13 is deploying a modular penetration framework known as the Tambur/Sumbur/Kalambur series.

Researchers describe the group’s overall shift as moving from “instantaneous disruption” to “intelligence-driven persistent parasitism” — a calculated evolution observed between 2024 and 2026.

One confirmed victim was a technician at a Ukrainian state-owned shipbuilding and machinery manufacturing plant, where the attackers had already established deep, covert access.

The impact of this campaign is serious and far-reaching. Because the attack chain primarily abuses legitimate Windows tools — including scheduled tasks, SSH, PowerShell, and RDP — standard antivirus solutions often fail to raise alerts.

The group is no longer in a hurry; it plants itself quietly and stays for months, slowly extracting sensitive data from within the organization’s trusted environment.

What makes this especially concerning is that by the time most organizations realize something is wrong, the attackers have likely already achieved their objectives.

Persistence Through RDP Hijacking and Covert Tunneling

The most alarming technical aspect of this campaign is how the attackers dig in and stay hidden for extended periods.

The Tambur module establishes persistence by planting scheduled tasks named “Tambur” and “Protector” inside the MicrosoftWindowsWDIProtector path — a location designed to look exactly like a native Windows Diagnostic Infrastructure component.

These tasks run with full administrator-level privileges and use a hardcoded password (1qaz@WSX) to maintain constant, uninterrupted access to the RDP service on the infected host.

Tambur Scheduled Task WDI Path (Source - Weixin)
Tambur Scheduled Task WDI Path (Source – Weixin)

The Kalambur and Sumbur modules extend this control further by routing all command-and-control (C2) traffic through the Tor anonymous network, effectively masking the attacker’s real location.

Using SSH reverse tunneling, the attacker maps the victim’s RDP port (3389) to a remote C2 server, enabling silent remote logins from anywhere in the world.

Sumbur, the more refined iteration of this framework, mimics Microsoft Edge’s update service — storing malicious VBScripts in a fake Edge update directory and triggering them every four hours to blend seamlessly with normal software activity.

Rounding out the attack is the DemiMur module, which injects a forged root certificate (DemiMurCA.crt) into the system’s trusted certificate store.

From that point forward, Windows treats all subsequent malicious payloads as fully trusted and signed.

Combined with forced Microsoft Defender exclusions covering the entire C drive, the host’s native security layer is completely neutralized, leaving attackers with a clean and undetected operating environment.

DemiMur Certificate Injection (Source - Weixin)
DemiMur Certificate Injection (Source – Weixin)

Organizations should immediately block third-party activation tools and unauthorized ISO images from entering their networks, as these serve as the primary delivery channel for this attack.

Internal network behavior — including scheduled task creation, registry modifications, and PowerShell execution — should be closely monitored for signs of tampering. Endpoint security must be kept fully updated with regular comprehensive scans.

Key institutions and industrial organizations should also strengthen internal auditing practices and build specific detection rules targeting anomalous RDP and SSH activity to prevent long-term intelligence theft.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerMalwareSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Improve Your Monitoring Program: Stop Attackers From Winning

Next Post

Google Forms Job Lures Deliver PureHVNC Malware Campaign

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us