Military organizations of Pakistan, Defense contractors of Pakistan and Government agencies of Pakistan: Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware

Military organizations of Pakistan, Defense contractors of Pakistan and Government agencies of Pakistan: Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware

Confucius APT Expands Cyber Espionage Campaigns Against Pakistan with New Malware Tools

The threat group Confucius, active since at least 2013, has launched a renewed phishing campaign targeting Pakistan, deploying advanced malware families including WooperStealer and the Python-based backdoor Anondoor. According to Fortinet FortiGuard Labs, the group has historically focused on government agencies, military organizations, defense contractors, and critical industries in South Asia, using spear-phishing and malicious documents as initial attack vectors.

Recent activity reveals an evolution in Confucius’ tactics. In December 2024, the group used a malicious .PPSX file to deliver WooperStealer via DLL side-loading, a technique also employed in a March 2025 campaign that leveraged Windows shortcut (.LNK) files to deploy the same malware. By August 2025, Confucius had shifted to Anondoor, a Python-based implant capable of exfiltrating device data, executing commands, capturing screenshots, enumerating files, and stealing Chrome passwords.

The group’s transition from information stealers to backdoors suggests a strategic pivot toward long-term surveillance and persistence. Fortinet notes that Confucius has demonstrated strong adaptability, employing obfuscation techniques and rapidly adjusting its infrastructure and malware to evade detection and align with intelligence-gathering objectives.

Separately, K7 Security Labs reported on a Patchwork APT campaign involving malicious macros that download .LNK files containing PowerShell code. These files initiate DLL side-loading to execute malware while displaying a decoy PDF, ultimately establishing command-and-control (C2) communication to exfiltrate system data, capture screenshots, and transfer files all while employing stealth mechanisms to avoid detection.

Source: https://thehackernews.com/2025/10/confucius-hackers-hit-pakistan-with-new.html

Establishment Division, Government of Pakistan cybersecurity rating report: https://www.rankiteo.com/company/establishment-division-government-of-pakistan

Pakistan Military Accounts Department (PMAD) cybersecurity rating report: https://www.rankiteo.com/company/pakistan-military-accounts-department-pmad

Turkish Aerospace Pakistan cybersecurity rating report: https://www.rankiteo.com/company/turkish-aerospace-pakistan

"id": "ESTPAKTUR1770202197",
"linkid": "establishment-division-government-of-pakistan, pakistan-military-accounts-department-pmad, turkish-aerospace-pakistan",
"type": "Cyber Attack",
"date": "12/2024",
"severity": "100",
"impact": "8",
"explanation": "Attack that could bring to a war"
{'affected_entities': [{'industry': ['Government',
                                     'Defense',
                                     'Critical Infrastructure'],
                        'location': 'Pakistan, South Asia',
                        'type': ['Government agencies',
                                 'Military organizations',
                                 'Defense contractors',
                                 'Critical industries']}],
 'attack_vector': ['Spear-phishing',
                   'Malicious documents',
                   'DLL side-loading',
                   'Windows shortcut (.LNK) files'],
 'data_breach': {'data_exfiltration': True,
                 'personally_identifiable_information': True,
                 'sensitivity_of_data': 'High',
                 'type_of_data_compromised': ['Device data',
                                              'Chrome passwords',
                                              'System data',
                                              'Screenshots',
                                              'Files']},
 'date_detected': '2024-12-01',
 'date_publicly_disclosed': '2025-08-01',
 'description': 'The threat group Confucius has launched a renewed phishing '
                'campaign targeting Pakistan, deploying advanced malware '
                'families including WooperStealer and the Python-based '
                'backdoor Anondoor. The group has historically focused on '
                'government agencies, military organizations, defense '
                'contractors, and critical industries in South Asia, using '
                'spear-phishing and malicious documents as initial attack '
                'vectors. Recent activity reveals an evolution in Confucius’ '
                'tactics, including DLL side-loading and the use of Windows '
                'shortcut (.LNK) files to deploy malware. The group has '
                'shifted from information stealers to backdoors for long-term '
                'surveillance and persistence.',
 'impact': {'data_compromised': 'Device data, Chrome passwords, system data, '
                                'screenshots, files',
            'identity_theft_risk': 'High'},
 'initial_access_broker': {'backdoors_established': True,
                           'high_value_targets': ['Government agencies',
                                                  'Military organizations',
                                                  'Defense contractors']},
 'investigation_status': 'Ongoing',
 'lessons_learned': 'Confucius APT demonstrates strong adaptability, employing '
                    'obfuscation techniques and rapidly adjusting '
                    'infrastructure and malware to evade detection and align '
                    'with intelligence-gathering objectives.',
 'motivation': 'Intelligence-gathering, Long-term surveillance',
 'post_incident_analysis': {'root_causes': 'Evolution in tactics, use of '
                                           'advanced malware (WooperStealer, '
                                           'Anondoor), DLL side-loading, and '
                                           'Windows shortcut (.LNK) files for '
                                           'initial access.'},
 'references': [{'source': 'Fortinet FortiGuard Labs'},
                {'source': 'K7 Security Labs'}],
 'response': {'third_party_assistance': 'Fortinet FortiGuard Labs, K7 Security '
                                        'Labs'},
 'threat_actor': 'Confucius APT',
 'title': 'Confucius APT Expands Cyber Espionage Campaigns Against Pakistan '
          'with New Malware Tools',
 'type': 'Cyber Espionage'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.