Close Menu
NotesleuNotesleu
    Facebook X (Twitter) Instagram
    NotesleuNotesleu
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
      • About US
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
    NotesleuNotesleu
    Home»Cyber Crime»Patchwork Cyber Group Targets Chinese Academic and Research Institutions with EyeShell Backdoor
    Network security and privacy crime. Computer hacker working on laptop, programming bugs and viruses.

    Patchwork Cyber Group Targets Chinese Academic and Research Institutions with EyeShell Backdoor

    By NotesleuNo Comments2 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Reddit Copy Link

    In a recent cyber espionage campaign, the threat actors, allegedly linked to the group known as Patchwork, are observed to be targeting Chinese universities and research institutions. KnownSec 404 Team has reported this activity, noting the deployment of a backdoor, codenamed EyeShell.

    Patchwork, also recognized as Operation Hangover and Zinc Emerson, is believed to be an Indian-backed cyber threat group. Active since at least December 2015, the group’s operations are usually narrowly focused, primarily targeting Pakistan and China with custom implants such as BADNEWS through spear-phishing and watering hole attacks.

    The group has been linked with cyber-espionage entities with an Indian connection, including SideWinder and the DoNot Team, based on overlapping tactics.

    Earlier in May, Meta identified and disabled 50 Patchwork-operated accounts on Facebook and Instagram. The group leveraged rogue messaging apps on the Google Play Store to harvest data from users in Pakistan, India, Bangladesh, Sri Lanka, Tibet, and China.

    “Patchwork deployed a series of sophisticated fake personas to socially engineer users into clicking on malicious links and downloading harmful apps,” Meta commented on the issue.

    EyeShell is a .NET-based modular backdoor that interacts with a remote command-and-control (C2) server. Its functionalities include executing commands to enumerate files and directories, downloading and uploading files, executing specified files, deleting files, and capturing screenshots.

    Patchwork also reportedly created a counterfeit review site for chat apps, deceptively promoting their own attacker-controlled app at the top of the list.

    Another alias linked with Patchwork’s activities is ModifiedElephant, according to Secureworks. The name corresponds to attacks against human rights activists, academics, and lawyers across India, intended for long-term surveillance and planting “incriminating digital evidence” in relation to the 2018 Bhima Koregaon violence in Maharashtra.

    In a parallel development, another round of phishing attacks has been identified, led by the group Bitter, targeting aerospace, military, large corporations, national government affairs, and universities in China, deploying a new backdoor named ORPCBackdoor.

    Bitter, a South Asian threat actor, has previously been observed to target the nuclear energy sector in China, delivering malware via CHM and Microsoft Excel Files, designed to establish persistence and download additional payloads.

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 53
    Featured Trending
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleMicrosoft Edge Deepens Dark Mode Experience with Enhanced Theme
    Next Article This AI Paper Deploys a Light-Weight Foundational Model in Outer Space for the First Time

    Related Posts

    General News December 26, 2025

    Indian National Pleads Guilty to $37 Million Cryptocurrency Theft Scheme

    December 26, 2025
    Cyber Attacks December 26, 2025

    2 Million Affected by SQL Injection and XSS Data Breach

    December 26, 2025
    Cyber Attacks December 26, 2025

    Cybersecurity Experts Uncover ToddyCat’s Expanded Arsenal of Data Theft Tools

    December 26, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Popular Post

    Complete HTML Handwritten Notes

    NKAbuse Malware Exploits NKN Blockchain for Advanced DDoS Attacks

    Advanced Python Mastery: For the Serious Developer

    Complete C++ Handwritten Notes From Basic to Advanced

    Google Introduces New Features Empowering Users to Manage Online Information

    © 2025 Notesleu. Designed by NIM.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.