Categories: Cyber Security News

New Malware Masquerades as Networking Software Updates in Targeted Attacks

A new, highly advanced backdoor has been uncovered targeting several major organizations across Russia’s government, finance, and industrial sectors, highlighting an escalating threat landscape for critical infrastructure.

The malware campaign, discovered during an ongoing investigation into a cyberincident in April 2025, demonstrates a refined approach, with the attackers deploying their payload through what appears to be legitimate software updates for ViPNet a widely used suite for establishing secure networks.

Backdoor Delivered through Impersonated ViPNet Update Archives

At the core of the attack is a deceptive distribution mechanism: the backdoor is packaged within LZH archive files that closely mimic the structure of authentic ViPNet software updates.

Sponsored

Each archive typically contains a mix of legitimate and malicious components, including a configuration file (action.inf), a valid executable (lumpdiag.exe), the actual malicious loader (msinfo32.exe), and an encrypted payload with a variable name.

Through analysis, investigators found that the action.inf file is crafted to instruct ViPNet’s update service (itcsrvup64.exe) to execute lumpdiag.exe with a specific –msconfig argument.

While lumpdiag.exe itself is legitimate, attackers exploit the path substitution technique, enabling the malicious msinfo32.exe to run concurrently.

This loader then reads and decrypts the payload file, ultimately injecting the backdoor into system memory.

Payload Capabilities and Ongoing Threat

Once established, the backdoor is versatile and robust, capable of connecting to a command-and-control (C2) server via TCP.

This connectivity allows attackers to exfiltrate files, deploy additional malware modules, and maintain persistent access to compromised systems, posing a significant risk to both organizational data and operational integrity.

The msinfo32.exe component is detected by Kaspersky’s cybersecurity solutions as HEUR:Trojan.Win32.Loader.gen, underscoring the evolving nature of loader-based threats.

In response to the incident, the developer of ViPNet has verified targeted attacks against some of their customers and has released security updates and guidelines to mitigate further risk.

Sponsored

However, the sophistication of this campaign reflects broader trends in advanced persistent threat (APT) operations, where multi-stage, deceptive attack chains are increasingly common.

According to the Kaspersky Report, this incident serves as another reminder of the importance of multi-layered, defense-in-depth cybersecurity strategies.

Modern APT groups employ highly unusual and unpredictable vectors, making traditional perimeter-based defenses inadequate on their own.

Security vendors stress the need for comprehensive, proactive monitoring and threat intelligence integration, as seen in products like Kaspersky NEXT, which are explicitly designed to counter and detect complex, multi-stage attacks.

While a full list of indicators of compromise is reserved for Kaspersky Threat Intelligence service subscribers, several hashes related to msinfo32.exe and key file paths have been publicly disclosed to assist organizations in hunting for signs of infection.

Security teams are urged to monitor for the presence of msinfo32.exe in temporary and program files directories as outlined, and to stay informed on further updates as the investigation continues.

As investigations progress, information sharing such as this remains essential for enabling at-risk organizations to take swift and effective action against emerging threats.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

The post New Malware Masquerades as Networking Software Updates in Targeted Attacks appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

TheraPlay hosting sensory friendly Easter event April 8

CULLMAN, Ala. – Easter Sunday is approaching! We are less than a month away from all…

14 seconds ago

Brownwood community gathers for ‘Wheels That Move the World’

BROWNWOOD, Texas (KTAB/KRBC) - Families in Brownwood spent part of their spring break getting an…

2 hours ago

MY TAKE: The AI magic is back — whether it endures depends on Amazon’s next moves

I ran an experiment this week that I did not expect to be instructive, and…

3 hours ago

Pluralistic: Corrupt anticorruption (14 Mar 2026)

Today's links Corrupt anticorruption: Notes from a target-rich environment. Hey look at this: Delights to…

3 hours ago

This Week’s Awesome Tech Stories From Around the Web (Through March 14)

Robotics How Pokémon Go Is Giving Delivery Robots an Inch-Perfect View of the WorldWill Douglas…

3 hours ago

How to Design and Apply AI Avatars for Modern Learning and Communication

Digital communication is well beyond picture and prose. Nowadays viewers demand more interactive and human-like…

3 hours ago

This website uses cookies.