Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
overview
This week, security researchers discovered that Xctdoor malware is actively targeting IIS servers to distribute additional malicious software. This attack has primarily affected the defense and manufacturing sectors by exploiting a Korean ERP solution.
The attackers used a compromised Korean ERP update server to infiltrate systems, similar to methods used by the Andariel group. The Go-based Xctdoor malware injects itself into system processes and survives system reboots by utilizing startup shortcuts. It is capable of stealing system information and executing commands from a command and control (C&C) server.
In March 2024, there was an attack on manufacturing sector web servers using XcLoader to propagate Xctdoor. By May 2024, attacks were focused on the defense sector using a modified approach involving Regsvr32.exe to run a malicious DLL.
Unauthorized access to sensitive information can lead to significant data breaches, resulting in financial loss, reputational damage, and potential legal consequences. Organizations should be particularly concerned about Xctodoor’s ability to steal sensitive data, execute arbitrary commands, and evade detection.
INDICATORS OF COMPROMISE (IoCs)
MD5
SHA-1
SHA256
IPv4
URLs
Domain
Hostname
SUPPORTING DOCUMENTATION