Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. (ptsecurity.com) CapFix Threat Group Deploys Evolved CapDoor Backdoor Against Russian Industrial and Aviation Organizations

(ptsecurity.com) CapFix Threat Group Deploys Evolved CapDoor Backdoor Against Russian Industrial and Aviation Organizations

Scheduled Pinned Locked Moved Uncategorized
cybersecuritythreatintel
1 Posts 1 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.com
    wrote last edited by
    #1

    (ptsecurity.com) CapFix Threat Group Deploys Evolved CapDoor Backdoor Against Russian Industrial and Aviation Organizations

    CapFix threat group targets Russian industrial/aviation sectors with evolved CapDoor backdoor, exploiting CVE-2025-49113 in Roundcube Webmail to compromise legitimate infrastructure. Secondary payloads include SectopRAT and AsyncRAT.

    In brief - Russian APT CapFix deploys updated CapDoor backdoor via Roundcube exploit (CVE-2025-49113) against industrial/aviation targets. Uses DLL sideloading, ChaCha20 C2 encryption, and delivers RAT payloads. Phishing lures shifted from crypto/hotel themes to government impersonation.

    Technically - CapDoor employs multi-stage DLL sideloading (orchestrator/watchdog/inject DLLs) via signed executables. Shellcode uses FNV-1 hashing for API resolution, MurmurHash3 (seed 0xE5BBB) for C2 tasks. ChaCha20 encrypts communications. Persistence via HKCU Run. Supports PowerShell, file execution (EXE/DLL/MSI), screenshots. Evolved from PE to shellcode delivery, removed GHOSTPULSE/HIJACKLOADER dependencies.

    Source: https://global.ptsecurity.com/en/research/pt-esc-threat-intelligence/an-alarm-you-can-t-ignore-how-capfix-attacks-russian-organizations

    #Cybersecurity #ThreatIntel

    1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Login or register to search.
    • First post
      Last post
    0
    • Categories
    • Recent
    • Tags
    • Popular
    • World
    • Users
    • Groups