{"id":21178,"date":"2022-03-01T20:52:42","date_gmt":"2022-03-01T20:52:42","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=21178"},"modified":"2022-03-01T20:52:42","modified_gmt":"2022-03-01T20:52:42","slug":"new-malware-evades-detection","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/","title":{"rendered":"Newly Discovered Malware Evades Detection by Hijacking Communications"},"content":{"rendered":"<p>While the cybersecurity world is focused on the <a href=\"https:\/\/www.esecurityplanet.com\/networks\/critical-infrastructure-security-steps-russia\/\">Russian invasion of Ukraine<\/a>, new research from Symantec serves as a reminder that significant threats remain elsewhere too.<\/p>\n<p>Symantec this week <a href=\"https:\/\/symantec-enterprise-blogs.security.com\/blogs\/threat-intelligence\/daxin-backdoor-espionage\">reported<\/a> a highly sophisticated <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a> called &#8220;Backdoor.Daxin&#8221; that &#8220;appears to be used in a long-running espionage campaign against select governments and other critical infrastructure targets&#8221; and appears to be linked to China.<\/p>\n<p>The researchers called Daxin &#8220;a highly sophisticated piece of malware being used by China-linked threat actors, exhibiting technical complexity previously unseen by such actors. The malware appears to be used in a long-running espionage campaign against select governments and other critical infrastructure targets.&#8221;<\/p>\n<p>Symantec said the backdoor\u2019s purpose is to exfiltrate data stealthily and can remain undetected even by networks with high defense capabilities. Symantec\u2019s team said the threat will probably require further in-depth analyses to uncover all the details.<\/p>\n<p>&#8220;Daxin is without doubt the most advanced piece of malware Symantec researchers have seen used by a China-linked actor,&#8221; the researchers wrote. &#8220;Considering its capabilities and the nature of its deployed attacks, Daxin appears to be optimized for use against hardened targets, allowing the attackers to burrow deep into a target\u2019s network and exfiltrate data without raising suspicions.&#8221;<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/critical-infrastructure-security-steps-russia\/\">SANS Outlines Critical Infrastructure Security Steps as Russia, U.S. Trade Cyberthreats<\/a><\/p>\n<h2><strong>Daxin\u2019s Impressive Ability to Remain Undetected<\/strong><\/h2>\n<p>Technically speaking, Daxin is a backdoor installed as a Windows kernel driver, which is a pretty unusual format for malware. The attackers use it to conduct various unauthorized operations on target machines, such as exfiltrating confidential documents or sending malicious payloads.<\/p>\n<p>So far, nothing new. However, Symantec researchers concluded Daxin is particularly stealthy, with a powerful ability to communicate over hijacked TCP\/IP connections. It swaps legitimate connections with encrypted channels to bypass <a href=\"https:\/\/www.esecurityplanet.com\/networks\/fine-tuning-firewall-rules-best-practices\/\">firewall rules<\/a> and evade most detection tools like <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">EDR<\/a>.<\/p>\n<p>The malware then sends information back to remote servers. This point seems to be the key to understanding this unusual backdoor: The malware does not create any additional network processes that can set off alerts, but rather attacks legitimate services already running.<\/p>\n<p>To proceed, it monitors specific patterns in incoming TCP traffic and then attempts to disconnect a legitimate recipient to take its place. If the exchange is successful, that channel will be used to receive command-and-control instructions and exfiltrate data.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-network-monitoring-tools\/\">Best Network Monitoring Tools<\/a><\/p>\n<h2>Multi-node Communications a New Tactic<\/h2>\n<p>Symantec included a graphic (see below) to explain how Daxin can sneak into secure environments by establishing multi-node communication channels with a new approach. The attackers can manipulate multiple infected computers in a single operation, while most similar attacks would use a step-by-step approach that would require separate operations.<\/p>\n<p>This approach may significantly lower the chance of detection, according to Symantec:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-21180\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/03\/daxin-schema-1024x509.png\" alt=\"daxin malware\" width=\"696\" height=\"346\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/daxin-schema-1024x509.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/daxin-schema-300x149.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/daxin-schema-768x382.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/daxin-schema-1536x764.png 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/daxin-schema-150x75.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/daxin-schema-696x346.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/daxin-schema-1068x531.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/daxin-schema-1920x955.png 1920w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/daxin-schema.png 2014w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<p>The multi-node architecture makes it possible to compromise computers recursively by relaying commands across the network and hiding communication channels deeply, which also extends the dwell period for malicious activities.<\/p>\n<p>Researchers published a detailed list of the potential resources used in Daxin attacks, for example, using filenames such as \u201cpatrol.sys\u201d, \u201cwantd.sys\u201d, or backdoors such as 514d389ce87481fe1fc6549a090acf0da013b897e282ff2ef26f783bd5355a01.<\/p>\n<p>See the <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">Top Endpoint Detection &amp; Response (EDR) Solutions<\/a><\/p>\n<h2><strong>Codebase Dates to 2009<\/strong><\/h2>\n<p>While the latest sample was discovered in November 2021, Symantec believes the malware contains blocks of instructions that recall Regin, an advanced espionage tool discovered by Symantec threat researchers in 2014. They also connected it to Zala, an older piece of malware discovered in 2009 that could have been the first experiments that led to Daxin many years later.<\/p>\n<p>Symantec\u2019s team found significant similarities in codebases that indicate it\u2019s probably the same actor or, at least, a group that \u201chad access to Zala\u2019s codebase.&#8221;<\/p>\n<p>There is no clear evidence of a single actor for now, but according to Symantec, the attack \u201cappears to be organizations and governments of strategic interest to China,\u201d as \u201ctools associated with Chinese espionage actors were found on some of the same computers where Daxin was deployed.\u201d<\/p>\n<p>In any case, the new threat does not look like the traditional analytics collected during China-related attacks, which might put the threat on a whole new level.<\/p>\n<p>Symantec collaborated with the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to warn foreign governments and help victims. CISA <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2022\/02\/28\/broadcom-software-discloses-apt-actors-deploying-daxin-malware\">urged<\/a> organizations to review Symantec\u2019s report \u201cfor more information and for a list of indicators of compromise that may aid in the detection of this activity.&#8221;<\/p>\n<p>This could be the latest chapter in the perpetual cyberwar between the U.S. and China, following recent claims by Chinese firms that the NSA hacked their infrastructure. Chinese researchers disclosed <a href=\"https:\/\/vulners.com\/thn\/THN:23248E12BE6FF4B44827E0C0A1FB7CFB\">details<\/a> about an <a href=\"https:\/\/www.esecurityplanet.com\/threats\/advanced-persistent-threat\/\">advanced persistent threat (APT)<\/a> called &#8220;bvp47,&#8221; named after an encryption algorithm attributed to the NSA.<\/p>\n<p>Read next: \u00a0<a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">Top Vulnerability Management Tools<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6fe2d35381-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6fe2d35381\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6fe2d35381\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6fe2d35381\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6fe2d35381\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6fe2d35381\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6fe2d35381\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>While the cybersecurity world is focused on the Russian invasion of Ukraine, new research from Symantec serves as a reminder that significant threats remain elsewhere too. Symantec this week reported a highly sophisticated malware called &#8220;Backdoor.Daxin&#8221; that &#8220;appears to be used in a long-running espionage campaign against select governments and other critical infrastructure targets&#8221; and [&hellip;]<\/p>\n","protected":false},"author":267,"featured_media":21180,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[5648],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[31788],"class_list":["post-21178","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-advanced-persistent-threats","b2b_audience-awareness-and-consideration","b2b_product-advanced-persistent-threats"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Newly Discovered Malware Evades Detection by Hijacking Communications | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"A new malware reported by Symantec hijacks communication channels to evade detection. It&#039;s been linked to China.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Newly Discovered Malware Evades Detection by Hijacking Communications | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"A new malware reported by Symantec hijacks communication channels to evade detection. It&#039;s been linked to China.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-01T20:52:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/daxin-schema.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2014\" \/>\n\t<meta property=\"og:image:height\" content=\"1002\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Julien Maury\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julien Maury\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/\"},\"author\":{\"name\":\"Julien Maury\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\"},\"headline\":\"Newly Discovered Malware Evades Detection by Hijacking Communications\",\"datePublished\":\"2022-03-01T20:52:42+00:00\",\"dateModified\":\"2022-03-01T20:52:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/\"},\"wordCount\":810,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/daxin-schema.png\",\"keywords\":[\"advanced persistent threats\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/\",\"name\":\"Newly Discovered Malware Evades Detection by Hijacking Communications | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/daxin-schema.png\",\"datePublished\":\"2022-03-01T20:52:42+00:00\",\"dateModified\":\"2022-03-01T20:52:42+00:00\",\"description\":\"A new malware reported by Symantec hijacks communication channels to evade detection. It's been linked to China.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/daxin-schema.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/daxin-schema.png\",\"width\":2014,\"height\":1002,\"caption\":\"daxin malware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Newly Discovered Malware Evades Detection by Hijacking Communications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\",\"name\":\"Julien Maury\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"caption\":\"Julien Maury\"},\"description\":\"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jmaury\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Newly Discovered Malware Evades Detection by Hijacking Communications | eSecurity Planet","description":"A new malware reported by Symantec hijacks communication channels to evade detection. It's been linked to China.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/","og_locale":"en_US","og_type":"article","og_title":"Newly Discovered Malware Evades Detection by Hijacking Communications | eSecurity Planet","og_description":"A new malware reported by Symantec hijacks communication channels to evade detection. It's been linked to China.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/","og_site_name":"eSecurity Planet","article_published_time":"2022-03-01T20:52:42+00:00","og_image":[{"width":2014,"height":1002,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/daxin-schema.png","type":"image\/png"}],"author":"Julien Maury","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Julien Maury","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/"},"author":{"name":"Julien Maury","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a"},"headline":"Newly Discovered Malware Evades Detection by Hijacking Communications","datePublished":"2022-03-01T20:52:42+00:00","dateModified":"2022-03-01T20:52:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/"},"wordCount":810,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/daxin-schema.png","keywords":["advanced persistent threats"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/","url":"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/","name":"Newly Discovered Malware Evades Detection by Hijacking Communications | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/daxin-schema.png","datePublished":"2022-03-01T20:52:42+00:00","dateModified":"2022-03-01T20:52:42+00:00","description":"A new malware reported by Symantec hijacks communication channels to evade detection. It's been linked to China.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/daxin-schema.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/daxin-schema.png","width":2014,"height":1002,"caption":"daxin malware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/new-malware-evades-detection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Newly Discovered Malware Evades Detection by Hijacking Communications"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a","name":"Julien Maury","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","caption":"Julien Maury"},"description":"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.","url":"https:\/\/www.esecurityplanet.com\/author\/jmaury\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21178"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/267"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=21178"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21178\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/21180"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=21178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=21178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=21178"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=21178"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=21178"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=21178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}