Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The “people’s airline” and the enterprise AI gold rush

    May 8, 2026

    Learn what it takes to raise a Series A in 2027 at Disrupt 2026

    May 8, 2026

    Kodiak AI raises $100M at a steep discount, sending its stock tumbling 37%

    May 8, 2026
    Facebook X (Twitter) Instagram
    Tech Pulse
    • The “people’s airline” and the enterprise AI gold rush
    • Learn what it takes to raise a Series A in 2027 at Disrupt 2026
    • Kodiak AI raises $100M at a steep discount, sending its stock tumbling 37%
    • Ramp in talks to hit $40B+ valuation, 6 months after reaching $32B
    • Gusto hits $1B revenue, a figure that brings it closer to public markets
    X (Twitter) Pinterest YouTube LinkedIn WhatsApp
    Techurz
    • Home
    • AI Systems
    • Cyber Reality
    • Future Tech
    • Disruption Lab
    • Signals
    • Tech Pulse
    Techurz
    Home - Security - Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network
    Security

    Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network

    TechurzBy TechurzOctober 22, 2025No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Snappybee Malware and Citrix Flaw
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Oct 21, 2025Ravie LakshmananCyber Espionage / Network Security

    A European telecommunications organization is said to have been targeted by a threat actor that aligns with a China-nexus cyber espionage group known as Salt Typhoon.

    The organization, per Darktrace, was targeted in the first week of July 2025, with the attackers exploiting a Citrix NetScaler Gateway appliance to obtain initial access.

    Salt Typhoon, also known as Earth Estries, FamousSparrow, GhostEmperor, and UNC5807, is the name given to an advanced persistent threat actor with ties to China. Known to be active since 2019, the group gained prominence last year following its attacks on telecommunications services providers, energy networks, and government systems in the U.S.

    The adversary has a track record of exploiting security flaws in edge devices, maintaining deep persistence, and exfiltrating sensitive data from victims in more than 80 countries across North America, Europe, the Middle East, and Africa.

    In the incident observed against the European telecommunications entity, the attackers are said to have leveraged the foothold to pivot to Citrix Virtual Delivery Agent (VDA) hosts in the client’s Machine Creation Services (MCS) subnet, while also using SoftEther VPN to obscure their true origins.

    One of the malware families delivered as part of the attack is Snappybee (aka Deed RAT), a suspected successor to the ShadowPad (aka PoisonPlug) malware that has been deployed in prior Salt Typhoon attacks. The malware is launched by means of a technique called DLL side-loading, which has been adopted by a number of Chinese hacking groups over the years.

    “The backdoor was delivered to these internal endpoints as a DLL alongside legitimate executable files for antivirus software such as Norton Antivirus, Bkav Antivirus, and IObit Malware Fighter,” Darktrace said. “This pattern of activity indicates that the attacker relied on DLL side-loading via legitimate antivirus software to execute their payloads.”

    The malware is designed to contact an external server (“aar.gandhibludtric[.]com”) over HTTP and an unidentified TCP-based protocol. Darktrace said the intrusion activity was identified and remediated before it could escalate further.

    “Salt Typhoon continues to challenge defenders with its stealth, persistence, and abuse of legitimate tools,” the company added. “The evolving nature of Salt Typhoon’s tradecraft, and its ability to repurpose trusted software and infrastructure, ensures it will remain difficult to detect using conventional methods alone.”

    breach Citrix European flaw Hackers malware network Snappybee telecom
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleSelf-propagating worm found in marketplaces for Visual Studio Code extensions
    Next Article The Samsung Galaxy XR headset comes with $1,000 worth of freebies – here’s what’s included
    Techurz
    • Website

    Related Posts

    Opinion

    Beyond Lovable and Mistral: 21 European startups to watch

    May 2, 2026
    Opinion

    Two college kids raise a $5.1 million pre-seed to build an AI social network in iMessage

    April 24, 2026
    Opinion

    After data breach, $10B valued startup Mercor is having a month

    April 9, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    College social app Fizz expands into grocery delivery

    September 3, 20252,288 Views

    A Former Apple Luminary Sets Out to Create the Ultimate GPU Software

    September 25, 202516 Views

    The Reason Murderbot’s Tone Feels Off

    May 14, 202512 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    College social app Fizz expands into grocery delivery

    September 3, 20252,288 Views

    A Former Apple Luminary Sets Out to Create the Ultimate GPU Software

    September 25, 202516 Views

    The Reason Murderbot’s Tone Feels Off

    May 14, 202512 Views
    Our Picks

    The “people’s airline” and the enterprise AI gold rush

    May 8, 2026

    Learn what it takes to raise a Series A in 2027 at Disrupt 2026

    May 8, 2026

    Kodiak AI raises $100M at a steep discount, sending its stock tumbling 37%

    May 8, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2026 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.