New TCESB Malware Discovered in Active Attacks Targeting ESET Security Scanner

Published: April 9, 2025
Category: Windows Security / Vulnerability

A Chinese-affiliated threat actor known for cyber-attacks in Asia has been seen exploiting a vulnerability in ESET security software to deploy previously unknown malware dubbed TCESB. According to Kaspersky’s recent analysis, “Previously unseen in ToddyCat attacks, [TCESB] is engineered to stealthily execute payloads, bypassing installed protection and monitoring tools.” The ToddyCat threat activity cluster has targeted various entities across Asia, with operations traced back to at least December 2020. In the prior year, a Russian cybersecurity company detailed the group’s use of multiple tools to maintain persistent access and conduct large-scale data harvesting from organizations in the Asia-Pacific region. Kaspersky’s investigation into ToddyCat incidents in early 2024 revealed a suspicious DLL file…

Newly Discovered TCESB Malware Targets ESET Security Software

April 09, 2025

Recent cybersecurity developments have illuminated a new malware strain known as TCESB, which is being actively deployed in ongoing attacks. This malware, linked to a Chinese-affiliated threat actor, exploits vulnerabilities in ESET security software. Analysts at Kaspersky have highlighted that TCESB is specifically crafted to execute its payloads discreetly, evading detection and tampering by existing protection and monitoring solutions.

The attacks are part of a broader campaign attributed to a threat activity cluster known as ToddyCat, active since at least December 2020. Targeting several organizations within Asia, ToddyCat has gained notoriety for its sophisticated tactics that facilitate long-term access to compromised networks. A previous analysis by Kaspersky revealed the use of various tools by this group to sustain persistent access and conduct extensive data harvesting operations from entities across the Asia-Pacific region.

The recent investigation into ToddyCat’s activities, particularly during early 2024, uncovered a dubious Dynamic Link Library (DLL) file that had significant implications for the security posture of affected organizations. The clever engineering of TCESB suggests that its deployment is designed with a high degree of stealth and resilience, leveraging the inadequacies of existing security measures rather than brute force.

In terms of potential tactics and techniques, the MITRE ATT&CK framework provides a useful lens through which to view the operational methods employed in these attacks. It is likely that the attackers tapped into initial access techniques to infiltrate systems and then established persistence in the networks they compromised. Additionally, privilege escalation might have been employed to gain higher-level access, facilitating broader movements within the networks of the targeted organizations.

The ongoing threat posed by TCESB and its connection with the ToddyCat group underscores the importance of maintaining robust cybersecurity defenses. Business owners should consider this new malware variant and its capabilities in the context of their organizational risk management strategies. The ability to adapt to evolving threats through updated security practices and vigilant monitoring is essential in today’s landscape of persistent cyber threats.

As the digital realm continues to develop, so too do the methods employed by cybercriminals. Organizations must remain vigilant and proactive in fortifying their defenses to combat such sophisticated attacks effectively.

Source link