UTG-Q-015黑客针对政府网络服务器的大规模暴力破解攻击
一种名为UTG-Q-015的复杂恶意软件针对政府Web服务器发起暴力破解攻击,利用凭证填充和SQL注入等技术入侵系统。该恶意软件采用多态代码生成和模块化架构规避检测,并通过进程空洞技术嵌入合法进程以维持持久性。其攻击导致敏感数据泄露和服务中断,对政府基础设施构成严重威胁。 2025-5-29 10:15:2 Author: cybersecuritynews.com(查看原文) 阅读量:0 收藏

UTG-Q-015 Hackers Launched Large Scale Brute-Force Attacks Against Govt Web Servers

A sophisticated malware campaign designated UTG-Q-015 has emerged as a significant threat to government infrastructure, targeting web servers through coordinated brute-force attacks across multiple jurisdictions.

The malware represents a new evolution in state-sponsored cyber warfare, demonstrating advanced persistence mechanisms and evasion techniques that have enabled attackers to maintain prolonged access to critical government systems.

The attack campaign began manifesting in early May 2025, with initial reports indicating compromised servers across defense ministries and municipal government portals.

Google News

UTG-Q-015 employs a multi-vector approach, combining credential stuffing attacks with SQL injection techniques to gain initial foothold on target systems.

The malware’s attack methodology involves systematic enumeration of administrative interfaces, followed by dictionary-based password attacks against identified user accounts.

Qianxin researchers identified the malware’s unique signature through behavioral analysis of compromised systems, noting its distinctive use of polymorphic code generation to evade signature-based detection systems.

The research team observed that UTG-Q-015 maintains a modular architecture, allowing attackers to deploy specialized payloads based on target environment characteristics.

Loading Vshell (Source – Qianxin)

The malware’s impact extends beyond simple data exfiltration, with evidence suggesting attackers have established persistent backdoors within compromised networks.

Government agencies report ongoing service disruptions and unauthorized access to sensitive databases containing citizen information and classified documents.

Advanced Persistence and Code Injection Mechanisms

UTG-Q-015 demonstrates sophisticated persistence tactics through its dynamic code injection capabilities.

Embedded js code (Source – Qianxin)

The malware embeds itself within legitimate system processes using a technique called “process hollowing,” where it replaces the memory space of authorized applications with malicious code.

# Simplified representation of injection technique
def inject_payload(target_process, malicious_code):
    suspended_process = create_process(target_process, SUSPENDED)
    unmap_memory(suspended_process.base_address)
    allocate_memory(suspended_process, malicious_code.size)
    write_memory(suspended_process, malicious_code)
    resume_thread(suspended_process.main_thread)

The malware utilizes registry manipulation and scheduled task creation to ensure persistence across system reboots, making detection and removal significantly challenging for affected organizations.

Celebrate 9 years of ANY.RUN! Unlock the full power of TI Lookup plan (100/300/600/1,000+ search requests), and your request quota will double.


文章来源: https://cybersecuritynews.com/utg-q-015-hackers-launched-large-scale-brute-force-attacks/
如有侵权请联系:admin#unsafe.sh