By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation
Tech News

Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation

By Viral Trending Content 4 Min Read
Share
SHARE

Ravie LakshmananMay 13, 2026Cyber Espionage / Malware

A threat actor with affiliations to China has been linked to a “multi-wave intrusion” targeting an unnamed Azerbaijani oil and gas company between late December 2025 and late February 2026, marking an expansion of its targeting.

The activity has been attributed by Bitdefender with moderate-to-high confidence to a hacking group known as FamousSparrow (aka UAT-9244), which shares some level of tactical overlap with clusters tracked under the monikers Earth Estries and Salt Typhoon.

The attack paves the way for the deployment of two distinct backdoors across three separate waves: Deed RAT (aka Snappybee), a successor of ShadowPad that’s used by multiple China-nexus espionage groups, and TernDoor, which was recently discovered in attacks targeting telecommunications infrastructure in South America since 2024.

What’s notable about the campaign is that it repeatedly leveraged the same vulnerable Microsoft Exchange Server entry point despite several remediation attempts, swapping backdoors each time: Deed RAT on December 25, 2025, TernDoor in late January/early February 2026, and a modified Deed RAT in late February 2026. The attackers are assessed to have exploited the ProxyNotShell chain to obtain initial access.

“This targeting extends the known FamousSparrow victimology into a region where Azerbaijan’s role in European energy security has materially increased following the 2024 expiration of Russia’s Ukraine gas transit agreement and 2026 Strait of Hormuz disruptions,” the Romanian cybersecurity company said in a report shared with The Hacker News.

“The intrusion illustrates that actors will exploit and re-exploit the same access path until the original vulnerability is patched, compromised credentials are rotated, and the attacker’s ability to return is fully disrupted.”

The initial access is said to have been followed by attempts to deploy web shells to establish a persistent foothold, and ultimately deploy Deed RAT using an evolved DLL side-loading technique that leverages the legitimate LogMeIn Hamachi binary to load and launch a rogue DLL that’s responsible for executing the main payload.

“Unlike standard DLL side-loading that relies on simple file replacement, this method overrides two specific exported functions within the malicious library,” Bitdefender explained. “This creates a two-stage trigger that gates the Deed RAT loader’s execution through the host application’s natural control flow, further evolving the defense evasion capabilities of traditional DLL side-loading.”

The attacks have also been found to conduct lateral movement to broaden their access within the compromised network and establish a redundant foothold to ensure resilience in the event that the activity is detected and removed.

The second wave, on the other hand, took place nearly a month after the initial intrusion, with the adversary attempting to unsuccessfully employ DLL side-loading to drop TernDoor by means of Mofu Loader, a shellcode loader previously attributed to GroundPeony.

The Azerbaijani firm was targeted a third time towards the end of February 2026, when the threat actors once again attempted to deploy a modified version of Deed RAT, indicating active efforts to refine and evolve its malware arsenal. This artifact uses “sentinelonepro [.]com” for command-and-control (C2).

“This intrusion should not be viewed as an isolated compromise, but as a sustained and adaptive operation conducted by an actor that repeatedly sought to regain and extend access within the victim environment,” Bitdefender said. “Across multiple waves of activity, the same access path was revisited, new payloads were introduced, and additional footholds were established, underscoring a high degree of persistence and operational discipline.”

You Might Also Like

SETU gets new €11.5m IBM system to boost skill development

Everyone at the Musk v. Altman Trial Is Using Fancy Butt Cushions

The OAuth & MCP Investigation Checklist

Samsung Galaxy Z Fold 8 Wide Camera Spec Leak

New Apple TV Expected Summer 2026 With Apple Intelligence

TAGGED: China, Cyber Security, Cybersecurity, Espionage, FamousSparrow, Internet, Microsoft Exchange, ProxyNotShell
Share This Article
Facebook Twitter Copy Link
Previous Article Europe’s household energy prices surge after Iran war: Which capitals were hit hardest?
Next Article SETU gets new €11.5m IBM system to boost skill development
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

America’s data centers are thirsty. Rural towns are paying the price—from tanked water pressure to stolen desert groundwater
Business
Bitcoin rebounds slightly above $81k amid institutional caution
Crypto
Trump–Xi Summit Shifts Focus to Iran as Strait of Hormuz Tensions Escalate: Insiders
Politics
Nintendo’s Live-Action Zelda Movie Keeps Changing Release Dates
Gaming News
Canada is offering free access to its national parks this summer
Travel
Iran preparing for renewed war as military assets remain largely intact, reports warn
World News
America ‘Must Fight To Win Crypto’, Galaxy CEO Novogratz Says
Crypto

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

America’s data centers are thirsty. Rural towns are paying the price—from tanked water pressure to stolen desert groundwater

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
America’s data centers are thirsty. Rural towns are paying the price—from tanked water pressure to stolen desert groundwater
May 14, 2026
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?