Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

PassiveNeuron Campaign: Espionage Campaign Targeting Windows Server Environments

Type
Campaign
Actors
❓Unknown
Pub. date
October 21, 2025
Initial access
1-day vulnerabilitySoftware misconfigExposed secret
Impact
Data exfiltration
Observed techniques
Vulnerability exploitationWebshell deploymentProcess injectionValid creds abuse
Observed tools
NeuralExecutorNeursite
Targeted technologies
Microsoft SQL Server
References
https://securelist.com/passiveneuron-campaign-with-apt-implants-and-cobalt-strike/117745/
Status
Finalized
Last edited
Oct 27, 2025 2:39 PM

Attackers obtain remote code execution through abuse of SQL-server environments (exploitation, SQL injection, or credential compromise) and attempt to install web shells. When detection (e.g., endpoint AV) blocks the web-shell stage they escalate to a multi-stage DLL loader chain. The first-stage DLLs are placed in System32 under legitimate-looking names (e.g., wlbsctrl.dll, TSMSISrv.dll, oci.dll) to guarantee startup loading (Phantom DLL Hijack). Loaders use inflated file overlays (>60–100 MB), adapter-MAC 32-bit hash checks and staged AES/Base64 payload files on disk to ensure execution only on intended hosts and to frustrate sandboxing and signature detection.

Final payloads include the Neursite backdoor (C2 via TCP/SSL/HTTP/HTTPS, proxy/lateral-movement modules, plugin support for shells/files/sockets) and NeuralExecutor (.NET backdoor able to fetch and execute additional assemblies, using ConfuserEx obfuscation and Dead-Drop Resolver from GitHub). Variants show use of process injection (WmiPrvSE/msiexec), VMProtect obfuscation, and occasional reuse of DLLs/PDB strings tied to other activity (e.g., imjp14k.dll), complicating attribution.

Made with 💙 by Wiz

Last Updated: April 3, 2025