• Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
No Result
View All Result
Home Cyber

Abandoned Sogou Zhuyin Update Server Hijacked in Taiwan Espionage Campaign

Jane Doe by Jane Doe
August 30, 2025
in Cyber
Share on FacebookShare on Twitter

In a sophisticated and long-running cyber espionage campaign, a Chinese-aligned threat actor has been found to have hijacked an abandoned update server for the Sogou Zhuyin input method editor (IME), using it as a vector to infect users primarily in Taiwan with multiple forms of malware. The operation, which has been active since at least late 2024, highlights a growing trend of attackers leveraging end-of-life software to bypass traditional security measures and conduct covert intelligence gathering.

The Sogou Zhuyin IME, a popular tool for traditional Chinese users, was officially discontinued in 2019. However, cybersecurity researchers discovered that a threat actor had registered the lapsed domain name, sogouzhuyin[.]com, and weaponized it to distribute malicious updates. The attack chain begins when an unsuspecting user downloads the official, and seemingly harmless, Sogou Zhuyin installer from a compromised third-party site, such as a modified Wikipedia page. A few hours after installation, the software’s automatic update process is triggered, fetching a malicious payload from the attacker-controlled server.

This method allowed the attackers to deploy several distinct malware families, including GTELAM, C6DOOR, DESFY, and TOSHIS. These malware strains have different purposes, from providing remote access and backdoor functionality to stealing sensitive information from infected systems. The campaign, which researchers have codenamed TAOTH, appears to be in a reconnaissance phase, with the attackers seeking to identify and profile high-value targets. This indicates a focus on espionage rather than broad-scale financial crime.

Read

PAGERDUTY Confirms Data Breach After Salesforce Account Compromise

Thailand’s PDPA Crackdown 2025: Major Fines and Lessons from Latest Enforcement

According to telemetry data, several hundred victims have been impacted, with a significant concentration in Taiwan. The targeting appears to be focused on dissidents, journalists, researchers, and technology or business leaders. The use of an unmaintained but legitimate software’s update mechanism demonstrates a new level of ingenuity in supply chain attacks, making it difficult for users to detect the compromise. This incident is a stark reminder for both individuals and organizations to exercise extreme caution with unsupported software and to maintain rigorous security practices, including proactive patching and log monitoring.

Previous Post

Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution

Next Post

Click Studios Patches Passwordstate Authentication Bypass Vulnerability

Jane Doe

Jane Doe

More Articles

UN Creates Two Mechanisms for Global Governance of AI
Cyber

French Retail Giant Auchan Discloses Cyberattack on Loyalty Accounts

French retail giant Auchan has confirmed that a cyberattack compromised the personal data of several hundred thousand customers, with the...

by Jane Doe
September 3, 2025
UN Creates Two Mechanisms for Global Governance of AI
Cyber

Hackers Breach Fintech Firm in Attempted $130M Bank Heist

A major Brazilian fintech company, Sinqia S.A., has revealed that it was the target of a sophisticated cyberattack on August...

by Jane Doe
September 3, 2025
UN Creates Two Mechanisms for Global Governance of AI
Cyber

A Decade of Strengthening Singapore’s Cyber Defence Amid Escalating Threats

Over the last ten years, Singapore has systematically built a formidable cyber defence framework, positioning itself as a global leader...

by Jane Doe
September 3, 2025
UN Creates Two Mechanisms for Global Governance of AI
Cyber

Pentera Announces Automated Security Validation for Cl0p – Most Active Ransomware Group in 2025

Cybersecurity company Pentera has unveiled a new automated security validation module designed to test and fortify defenses against the Cl0p...

by Jane Doe
September 3, 2025
Next Post
Two New UN Initiatives to Ensure Responsible AI Development

Click Studios Patches Passwordstate Authentication Bypass Vulnerability

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Latest News

Hacking AI the Right Way: A Guide to AI Red Teaming

Hacking AI the Right Way: A Guide to AI Red Teaming

May 27, 2025
Researchers Cracked the Encryption Used by DarkBit Ransomware

Researchers Cracked the Encryption Used by DarkBit Ransomware

August 12, 2025
Researchers Cracked the Encryption Used by DarkBit Ransomware

High-severity WinRAR 0-day exploited for weeks by 2 groups

August 12, 2025

Transforming App Development with AI, Part 3: Challenges and Ethical Considerations

March 19, 2025
Exploring AI’s Critical Role in Climate Change at the G7 Summit

Exploring AI’s Critical Role in Climate Change at the G7 Summit

May 28, 2025
Are We Ready for the Next Cyber Storm? Why Staying Passive Is the Greatest Risk

Are We Ready for the Next Cyber Storm?

April 26, 2025
Researchers Cracked the Encryption Used by DarkBit Ransomware

Ghanaian Nationals Extradited for Roles in $100M Romance and Wire Fraud

August 12, 2025
Sumtrix.com

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Navigate Site

  • About
  • Contact
  • Privacy Policy
  • Advertise

Follow Us

No Result
View All Result
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Our website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.