Close Menu
NotesleuNotesleu
    Facebook X (Twitter) Instagram
    NotesleuNotesleu
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
      • About US
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
    NotesleuNotesleu
    Home»Cybersecurity»Hackers backdoor telecom providers with new HTTPSnoop malware

    Hackers backdoor telecom providers with new HTTPSnoop malware

    By NotesleuNo Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Reddit Copy Link

    Telecom operators in the Middle East face a rising cyber threat, as malevolent actors employ the newly discovered HTTPSnoop and PipeSnoop malware tools to remotely manipulate infected systems.

    HTTPSnoop operates by interacting with Windows HTTP core drivers and devices, executing specific content upon detecting particular HTTP(S) URLs. On the other hand, PipeSnoop waits to receive and run arbitrary shellcode from a designated pipe.

    Cisco Talos, in its comprehensive report, reveals that both these tools are part of the ‘ShroudedSnooper’ cyber-espionage toolkit, though they cater to distinct tactical requirements based on infiltration depth.

    Astonishingly, both malware tools masquerade as part of Palo Alto Networks Cortex XDR’s security modules, a tactic to remain unnoticed.

    Deep Dive: HTTPSnoop

    By tapping into rudimentary Windows APIs, HTTPSnoop keeps an eye on HTTP(S) traffic, waiting to catch predefined URLs. When it detects these URLs, it swiftly deciphers incoming base64-encoded data, subsequently running it as shellcode on the breached system.

    Employing DLL hijacking, the malware becomes operational on the target machine and bifurcates into two sections: one that constructs a concealed web server using kernel calls, and the other, its configuration.

    Setting up an incessant monitoring loop, HTTPSnoop stands by for incoming HTTP requests. Upon obtaining validated data, it processes it; otherwise, it responds with an HTTP 302 redirect.

    The malware then decrypts and runs the received shellcode, and sends back the outcome to the perpetrators in the form of base64-encoded XOR-encoded segments.

    Furthermore, it checks to avoid any URL overlap with previously set server URLs.

    Over a span of twelve days in April 2023, three HTTPSnoop iterations emerged, each showcasing varied URL detection methods. The most recent version is finely tuned to catch fewer URLs, optimizing its concealment capabilities.

    Crafting URLs resembling genuine Microsoft Exchange Web Services and OfficeTrack requests ensures that these malicious demands are camouflaged amidst regular traffic.

    Spotlight: PipeSnoop

    In May 2023, Cisco flagged PipeSnoop, a tool that functions as a gateway, running shellcode operations on invaded systems via Windows IPC channels.

    Interestingly, while HTTPSnoop zeroes in on externally accessible servers, PipeSnoop thrives in the heart of compromised networks.

    Although PipeSnoop relies on an external module for its shellcode, Cisco analysts are yet to pin it down.

    Owing to their strategic importance in managing vital infrastructure and transmitting confidential data, telecom service providers remain in the crosshairs of government-backed cyber adversaries. The escalating assaults on telecom bodies emphasize the pressing need for heightened security protocols and global collaborations to shield these entities.

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 56
    Featured
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleMicrosoft Alerts About Phishing Tactics Using Teams Messages to Target Enterprises
    Next Article Deceptive WinRAR Exploit Carries VenomRAT Payload

    Related Posts

    Cyber Attacks December 26, 2025

    2 Million Affected by SQL Injection and XSS Data Breach

    December 26, 2025
    Cyber Attacks December 26, 2025

    Cybersecurity Experts Uncover ToddyCat’s Expanded Arsenal of Data Theft Tools

    December 26, 2025
    Tech December 26, 2025

    “I Had a Dream” and Generative AI Jailbreaks

    December 26, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Popular Post

    Complete HTML Handwritten Notes

    NKAbuse Malware Exploits NKN Blockchain for Advanced DDoS Attacks

    Advanced Python Mastery: For the Serious Developer

    Complete C++ Handwritten Notes From Basic to Advanced

    Google Introduces New Features Empowering Users to Manage Online Information

    © 2025 Notesleu. Designed by NIM.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.