{"id":219999,"date":"2025-08-13T04:15:38","date_gmt":"2025-08-13T09:15:38","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2025\/08\/charon-ransomware-hits-middle-east-sectors-using-apt-level-evasion-tactics"},"modified":"2025-08-13T04:15:38","modified_gmt":"2025-08-13T09:15:38","slug":"charon-ransomware-hits-middle-east-sectors-using-apt-level-evasion-tactics","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2025\/08\/charon-ransomware-hits-middle-east-sectors-using-apt-level-evasion-tactics","title":{"rendered":"Charon Ransomware Hits Middle East Sectors Using APT-Level Evasion Tactics"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/charon-ransomware-hits-middle-east-sectors-using-apt-level-evasion-tactics.jpg\"><\/a><\/p>\n<p>The threat actor behind the activity, according to Trend Micro, exhibited tactics mirroring those of advanced persistent threat (APT) groups, such as DLL side-loading, process injection, and the ability to evade endpoint detection and response (EDR) software.<\/p>\n<p>The DLL side-loading techniques resemble those previously documented as part of attacks orchestrated by a China-linked hacking group called <a href=\"https:\/\/thehackernews.com\/2024\/09\/chinese-hackers-exploit-geoserver-flaw.html\" rel=\"noopener\" target=\"_blank\">Earth Baxia<\/a>, which was flagged by the cybersecurity company as targeting government entities in Taiwan and the Asia-Pacific region to deliver a backdoor known as EAGLEDOOR following the exploitation of a now-patched security flaw affecting OSGeo GeoServer GeoTools.<\/p>\n<p>\u201cThe attack chain leveraged a legitimate browser-related file, Edge.exe (originally named cookie_exporter.exe), to sideload a malicious msedge.dll (SWORDLDR), which subsequently deployed the Charon ransomware payload,\u201d researchers Jacob Santos, Ted Lee, Ahmed Kamal, and Don Ovid Ladore <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/25\/h\/new-ransomware-charon.html\" rel=\"noopener\" target=\"_blank\">said<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The threat actor behind the activity, according to Trend Micro, exhibited tactics mirroring those of advanced persistent threat (APT) groups, such as DLL side-loading, process injection, and the ability to evade endpoint detection and response (EDR) software. The DLL side-loading techniques resemble those previously documented as part of attacks orchestrated by a China-linked hacking group [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,1490],"tags":[],"class_list":["post-219999","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-government"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/219999","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=219999"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/219999\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=219999"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=219999"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=219999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}