Aman Mishra
2025-02-27 13:05:00
gbhackers.com
A newly identified malware, dubbed “Squidoor,” has emerged as a sophisticated threat targeting government, defense, telecommunications, education, and aviation sectors in Southeast Asia and South America.
Attributed to a suspected Chinese threat actor under the activity cluster CL-STA-0049, Squidoor employs advanced techniques to infiltrate networks, maintain persistence, and exfiltrate sensitive data.
This modular backdoor is designed for stealth and adaptability, making it a formidable tool for cyber espionage.
Multi-Protocol Command-and-Control (C2) Techniques
Squidoor leverages multiple covert communication methods to interact with its command-and-control (C2) servers.
Key among these are the Outlook API, DNS tunneling, and ICMP tunneling.
The Windows variant of Squidoor supports ten distinct C2 communication methods, while its Linux counterpart offers nine.
These methods include HTTP-based communication, reverse TCP/UDP connections, named pipes for internal communication, and even masquerading as an Outlook mail client using the Microsoft Graph API.
The Outlook-based communication is particularly insidious.


Squidoor uses hard-coded refresh tokens to authenticate with Microsoft’s identity platform and interacts with the Outlook REST API to send and retrieve commands disguised as email drafts.
This approach blends malicious traffic with legitimate network activity, making detection challenging.
Initial Access and Lateral Movement
The attackers gain initial access by exploiting vulnerabilities in Internet Information Services (IIS) servers and deploying web shells such as OutlookDC.aspx and TimeoutAPI.aspx.
According to Palo Alto Networks Report, these web shells serve as persistent entry points for executing commands on compromised systems.
Once inside, the malware spreads laterally across networks using tools like curl and Impacket, often disguising payloads as legitimate files.
Persistence Through LOLBAS Techniques
Squidoor employs a rarely observed Living-Off-the-Land Binary-and-Script (LOLBAS) technique using Microsoft’s Console Debugger (cdb.exe).
Renamed as fontdrvhost.exe, this binary is used to load shellcode directly into memory, bypassing traditional antivirus detection.
Persistence is maintained via scheduled tasks that execute Squidoor’s payloads upon system startup.


The malware’s modular architecture enables a wide range of capabilities, including host reconnaissance, arbitrary command execution, file exfiltration, payload delivery, and lateral communication between infected endpoints.
Squidoor also supports code injection into processes like mspaint.exe or conhost.exe, further evading detection by security tools.
Additional modules allow attackers to execute PowerShell scripts without invoking the PowerShell binary or perform pass-the-hash attacks.
Squidoor represents a significant evolution in malware design, combining stealthy communication channels with modular functionality to target high-value organizations.
Its multi-platform compatibility and ability to blend into legitimate network traffic underscore the growing sophistication of state-sponsored cyber threats.
Security professionals are urged to implement robust detection measures and leverage advanced threat prevention tools to counteract such threats effectively.
Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free
Keep your files stored safely and securely with the SanDisk 2TB Extreme Portable SSD. With over 69,505 ratings and an impressive 4.6 out of 5 stars, this product has been purchased over 8K+ times in the past month. At only $129.99, this Amazon’s Choice product is a must-have for secure file storage.
Help keep private content private with the included password protection featuring 256-bit AES hardware encryption. Order now for just $129.99 on Amazon!
Help Power Techcratic’s Future – Scan To Support
If Techcratic’s content and insights have helped you, consider giving back by supporting the platform with crypto. Every contribution makes a difference, whether it’s for high-quality content, server maintenance, or future updates. Techcratic is constantly evolving, and your support helps drive that progress.
As a solo operator who wears all the hats, creating content, managing the tech, and running the site, your support allows me to stay focused on delivering valuable resources. Your support keeps everything running smoothly and enables me to continue creating the content you love. I’m deeply grateful for your support, it truly means the world to me! Thank you!
BITCOIN bc1qlszw7elx2qahjwvaryh0tkgg8y68enw30gpvge Scan the QR code with your crypto wallet app |
DOGECOIN D64GwvvYQxFXYyan3oQCrmWfidf6T3JpBA Scan the QR code with your crypto wallet app |
ETHEREUM 0xe9BC980DF3d985730dA827996B43E4A62CCBAA7a Scan the QR code with your crypto wallet app |
Please read the Privacy and Security Disclaimer on how Techcratic handles your support.
Disclaimer: As an Amazon Associate, Techcratic may earn from qualifying purchases.