Hackers Hide SSH-Tor Backdoor Inside Weaponized Military ZIP Documents

Hackers Hide SSH-Tor Backdoor Inside Weaponized Military ZIP Documents
Hackers Hide SSH-Tor Backdoor Inside Weaponized Military ZIP Documents
In October 2025, researchers at Cyble Research and Intelligence Labs (CRIL) uncovered a sophisticated malware campaign distributing a weaponized ZIP archive disguised as a Belarusian military document titled “ТЛГ на убытие на переподготовку.pdf” (TLG for departure for retraining.pdf).

The malicious archive was explicitly designed to lure personnel from the Belarusian Special Operations Command specializing in UAV and drone operations, suggesting targeted intelligence collection on regional military capabilities.

Advanced Multi-Stage Infection Chain

The attack begins with a ZIP file containing a Windows shortcut (LNK) disguised as a legitimate PDF. When executed, the LNK triggers embedded PowerShell commands that extract another hidden archive, install payloads under %appdata%logicpro, and execute obfuscated scripts.

These scripts validate system conditions, such as the number of LNK files and active processes, to evade sandbox detection before proceeding with infection.

ywAAAAAAQABAAACAUwAOw==
Infection chain

After the environmental checks, a decoy PDF opens to maintain user trust while the malware silently establishes persistence through a scheduled task.

This task creates two key services on the infected host a backdoor enabled via OpenSSH for Windows and an anonymized communication layer via the Tor network, enhanced with obfs4 traffic obfuscation technology.

SSH and Tor-Based Covert Access

CRIL’s analysis revealed that the malware deploys githubdesktop.exe, a renamed Microsoft-signed OpenSSH executable configured to run an SSH service on port 20321 using RSA key-based authentication only.

The configuration file restricts access to preloaded authorized keys, ensuring only the attacker’s private key can authenticate. An SFTP subsystem (ebay.exe) facilitates file transfer and exfiltration operations.

The second scheduled task launches a customized Tor binary (pinterest.exe) configured to host an onion service linked to the SSH, RDP, and SMB ports, providing the threat actor with remote desktop access, secure file transfer, and network share exploration.

The obfs4 plugin (confluence.exe) disguises all Tor traffic as regular network communication, effectively concealing activity from traditional monitoring systems.

Data exfiltration occurs via a curl command routed through a SOCKS5 proxy, transmitting the host’s unique onion address and campaign identifiers to the command-and-control infrastructure.

ywAAAAAAQABAAACAUwAOw==
Files inside the archive

CRIL successfully replicated the attack and established SSH connectivity, confirming full remote access capability via the Tor-anonymized channel.

Although no secondary payloads were detected, researchers assess with moderate confidence that this intrusion shares technical links with the December 2024 Sandworm (APT44/UAC-0125) campaign.

The obfs4 integration, pre-generated RSA keys, and improved persistence mechanisms mark an evolution of Sandworm’s tactics, emphasizing continued adaptation in state-backed cyber espionage targeting Eastern European military assets.

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

The post Hackers Hide SSH-Tor Backdoor Inside Weaponized Military ZIP Documents appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading