Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Tapo releases new security camera with bright floodlight

    Garmin fixes Smart Wake alarm issue in new beta update

    Highly rated LG C5 OLED TV in 42 to 65-inch screen sizes is now on sale at up to 65% off

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026
    • Business

      The HDD brand that brought you the 1.8-inch, 2.5-inch, and 3.5-inch hard drives is now back with a $19 pocket-sized personal cloud for your smartphones

      February 12, 2026

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025
    • Crypto

      Berachain Jumps 150% as Strategic Pivot Lifts BERA

      February 12, 2026

      Tom Lee’s BitMine (BMNR) Stock Faces Cost-Basis Risk — Price Breakdown at 10%?

      February 12, 2026

      Why the US Jobs Data Makes a Worrying Case for Bitcoin

      February 12, 2026

      MYX Falls Below $5 as Short Sellers Take Control — 42% Decline Risk Emerges

      February 12, 2026

      Solana Pins Its $75 Support on Short-Term Buyers — Can Price Survive This Risky Setup?

      February 12, 2026
    • Technology

      Tapo releases new security camera with bright floodlight

      February 12, 2026

      Garmin fixes Smart Wake alarm issue in new beta update

      February 12, 2026

      Highly rated LG C5 OLED TV in 42 to 65-inch screen sizes is now on sale at up to 65% off

      February 12, 2026

      PS Plus February 2026 Game Catalogue leaked: Three new games coming to Extra and Premium

      February 12, 2026

      Jony Ive reimagines Apple Car in skeuomorphic Ferrari Luce interior rebuffing Tesla touchscreens

      February 12, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»China-related threat actors deployed a new fileless malware against the Philippines military
    Technology

    China-related threat actors deployed a new fileless malware against the Philippines military

    TechAiVerseBy TechAiVerseSeptember 11, 2025No Comments3 Mins Read7 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    China-related threat actors deployed a new fileless malware against the Philippines military
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    China-related threat actors deployed a new fileless malware against the Philippines military

    (Image credit: Shutterstock)

    • EggStreme is a stealthy, fileless malware framework used by a Chinese threat actor to target a Philippine military company
    • It includes six modular components, enabling reverse shell access, payload injection, keylogging, and persistent espionage
    • Attribution remains uncertain, but the attack’s objectives align with known Chinese APT tactics across APAC and beyond

    A Chinese threat actor attacked a Philippine military company with a never-before-seen, fileless malware framework, researchers warned.

    Earlier this week, cybersecurity outfit Bitdefender published an in-depth report about EggStreme, a “multi-stage toolset that achieves low-profile espionage by injecting malicious code directly into memory and leveraging DLL sideloading to execute payloads.”

    It counts six different components: EggStremeFuel (initial loader DLL, sideloaded via a legitimate binary and establishes a reverse shell), EggStremeLoader (reads encrypted payloads and injects them into processes), EggStremeReflectiveLoader (decrypts and injects the final payload), EggStremeAgent (main backdoor implant with 58 commands), EggStremeKeylogger (grabs keystrokes and sensitive user data), and EggStremeWizard (secondary backdoor for redundancy).

    Sideloading DLLs

    Bitdefender tried to link the framework to known Chinese APT players, but failed to find a plausible connection, The Hacker News reported. “We put quite a lot of effort into attribution efforts, but couldn’t find anything,” Martin Zugec, technical solutions director at Bitdefender, told the publication. “However, objectives align with Chinese APTs. For this one, our attribution is based on interests/objectives.”

    The objectives for this one, it seems, are cyber-espionage, reconnaissance, and long-term, low-profile persistence, something Chinese actors are known for – not just in the Philippines, but elsewhere in the region (Vietnam, Taiwan, and other neighboring countries), as well as around the world.

    Salt Typhoon is perhaps the most documented Chinese APT out there, and it was recently caught in numerous telecommunications service provider companies in the US.

    The EggStreme malware framework is delivered via a side-loaded DLL file. This file was activated using trusted executables, allowing it to bypass security controls. However, how the DLL file was dropped onto the victim’s device in the first place, remains unknown.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    Usual methods include supply chain compromise, deploying the DLL manually (via previously obtained access), or through drive-by compromise and lateral movement.

    Via The Hacker News

    You might also like

    • AI-written malware is here, and going after victims already
    • Take a look at our guide to the best authenticator app
    • We’ve rounded up the best password managers

    Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleTineco’s new wet-dry vac has a built-in squeegee so your floors won’t end up slippery
    Next Article Nvidia has launched a GPU with 128GB of GDDR7 RAM but yeah, there’s no way it will sell one to us to run games
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Tapo releases new security camera with bright floodlight

    February 12, 2026

    Garmin fixes Smart Wake alarm issue in new beta update

    February 12, 2026

    Highly rated LG C5 OLED TV in 42 to 65-inch screen sizes is now on sale at up to 65% off

    February 12, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025668 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025256 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025152 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025111 Views
    Don't Miss
    Technology February 12, 2026

    Tapo releases new security camera with bright floodlight

    Tapo releases new security camera with bright floodlight – NotebookCheck.net News ⓘ TapoTapoTapo’s C710 2K…

    Garmin fixes Smart Wake alarm issue in new beta update

    Highly rated LG C5 OLED TV in 42 to 65-inch screen sizes is now on sale at up to 65% off

    PS Plus February 2026 Game Catalogue leaked: Three new games coming to Extra and Premium

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Tapo releases new security camera with bright floodlight

    February 12, 20262 Views

    Garmin fixes Smart Wake alarm issue in new beta update

    February 12, 20264 Views

    Highly rated LG C5 OLED TV in 42 to 65-inch screen sizes is now on sale at up to 65% off

    February 12, 20263 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    This new Roomba finally solves the big problem I have with robot vacuums

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.