Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      This week in AI updates: Mistral’s new Le Chat features, ChatGPT updates, and more (September 5, 2025)

      September 6, 2025

      Designing For TV: Principles, Patterns And Practical Guidance (Part 2)

      September 5, 2025

      Neo4j introduces new graph architecture that allows operational and analytics workloads to be run together

      September 5, 2025

      Beyond the benchmarks: Understanding the coding personalities of different LLMs

      September 5, 2025

      Hitachi Energy Pledges $1B to Strengthen US Grid, Build Largest Transformer Plant in Virginia

      September 5, 2025

      How to debug a web app with Playwright MCP and GitHub Copilot

      September 5, 2025

      Between Strategy and Story: Thierry Chopain’s Creative Path

      September 5, 2025

      What You Need to Know About CSS Color Interpolation

      September 5, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Why browsers throttle JavaScript timers (and what to do about it)

      September 6, 2025
      Recent

      Why browsers throttle JavaScript timers (and what to do about it)

      September 6, 2025

      How to create Google Gemini AI component in Total.js Flow

      September 6, 2025

      Drupal 11’s AI Features: What They Actually Mean for Your Team

      September 5, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Harnessing GitOps on Linux for Seamless, Git-First Infrastructure Management

      September 6, 2025
      Recent

      Harnessing GitOps on Linux for Seamless, Git-First Infrastructure Management

      September 6, 2025

      How DevOps Teams Are Redefining Reliability with NixOS and OSTree-Powered Linux

      September 5, 2025

      Distribution Release: Linux Mint 22.2

      September 4, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Fancy Bear Develops Fancy New Outlook Backdoor

    Fancy Bear Develops Fancy New Outlook Backdoor

    September 4, 2025

    Outlook backdoor email malware

    Security researchers have uncovered a new Microsoft Outlook backdoor developed by Russian threat actors that monitors incoming email for trigger words and can exfiltrate data, upload files and execute commands on victim machines.

    Dubbed “NotDoor” by researchers at S2 Grupo’s LAB52, the malware has been attributed to the APT28 threat group – aka “Fancy Bear” – that has been linked to the Russian GRU military intelligence unit.

    The malware “highlights the ongoing evolution of APT28, demonstrating how it continuously generates new artefacts capable of bypassing established defense mechanisms,” the researchers wrote in a blog post.

    The Outlook backdoor has been used to compromise “multiple companies from various sectors in NATO member countries,” they said.

    Outlook Backdoor is a VBA Macro

    The malware was named “NotDoor” because of the use of the word “Nothing” in the code. The backdoor is a VBA macro for Outlook that monitors incoming emails for specific trigger words, and if detected, “enables an attacker to exfiltrate data, upload files, and execute commands on the victim’s computer,” the researchers said.

    To avoid detection, the backdoor is deployed via the legitimate signed binary Microsoft OneDrive.exe, which the researchers said is vulnerable to DLL side-loading. The malicious file DLL SSPICLI.dll installs the VBA backdoor and disables macro security protections. The backdoor, located in c:programdatatesttemp.ini, launches the execution chain.

    The loader runs three PowerShell commands, encoded in Base64, to load the macros to %APPDATA%MicrosoftOutlookVbaProject.OTM, to perform nslookup to verify that the code executed successfully, and to send a curl request to a webhook.site URL.

    Establishing Persistence

    The loader establishes persistence, enables macro execution and disables dialogue messages by modifying Windows Outlook registry keys.

    When Outlook is started or new email arrives, the malware uses the Application_MAPILogonComplete and Application_NewMailEx events to execute code. If it doesn’t already exist, the malware creates a folder at the path %TEMP%Temp to store artifacts generated by the malware. If the folder contains any files when the malware starts, they are sent to the email address a.matti444@proton[.]me, with the subject line “Re: 0”, after which the files are deleted regardless of whether they’ve been sent successfully.

    When the client receives an email, the malware checks for a specific string. “If the string is found, the malware parses the email’s contents to extract the commands to be executed,” the researchers said.

    The trigger string was “Daily Report” in the example the researchers studied, but they added that multiple triggers could be configured so it’s possible the string could vary in other instances. Once the backdoor has been activated, the email that triggered it is deleted, they said.

    The researchers included SHA256 hashes in their report, which were detected by only four of 72 security vendors at the time their report was published on Sept. 3:

    SSPICLI.dll: 5a88a15a1d764e635462f78a0cd958b17e6d22c716740febc114a408eef66705

    testtemp.ini: 8f4bca3c62268fff0458322d111a511e0bcfba255d5ab78c45973bd293379901

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleHow Russia-Linked Spies Turned Everyday Websites into Surveillance Traps aka ‘Watering Hole’
    Next Article FBI warns seniors are being targeted in three-phase Phantom Hacker scams

    Related Posts

    Development

    How to focus on building your skills when everything’s so distracting with Ania Kubów [Podcast #187]

    September 6, 2025
    Development

    Introducing freeCodeCamp Daily Python and JavaScript Challenges – Solve a New Programming Puzzle Every Day

    September 6, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Malbian is a Linux distribution for malware analysis and reverse engineering

    Linux

    Deconstructing the Request Lifecycle in Sitecore Headless – Part 2: SSG and ISR Modes in Next.js

    Development

    CVE-2025-48959 – Acronis Cyber Protect Cloud Agent Local Privilege Escalation

    Common Vulnerabilities and Exposures (CVEs)

    9 Easter Newsletter Ideas to Generate Engagement and Sales

    Web Development

    Highlights

    VESDA Aspirating Smoke Detection System Setup Cost in India | Xtralis Price & Installation

    May 14, 2025

    Post Content Source: Read More 

    Building Production-Ready Custom AI Agents for Enterprise Workflows with Monitoring, Orchestration, and Scalability

    June 22, 2025

    Free Windows 10 Extended Security Updates are now yours to claim — but there’s a catch

    July 22, 2025

    Game, Set, Match: Hyderabad Sports Fest 2025

    August 27, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.