ToddyCat Exploits ESET Flaw for Stealthy TCESB Attack

Franetic / Sales / ToddyCat Exploits ESET Flaw for Stealthy TCESB Attack
Share This Post

ToddyCat Hackers Unleash Stealthy TCESB Attack by Exploiting ESET Flaw

In an alarming development that has sent shockwaves through the cybersecurity landscape, a notorious cybercriminal group named ToddyCat has been harnessing a security vulnerability in ESET’s software to deploy an insidious new strain of malware known as TCESB. By circumventing conventional defenses, this attack delivers a strike that is both stealthy and dangerous, targeting devices across Asia.


The Shadowy Network Behind TCESB

ToddyCat, recognized globally as an advanced persistent threat (APT) group believed to be operating from China, is behind this malicious campaign. These hackers have cunningly capitalized on a flaw within ESET’s trusted security solutions, allowing them to execute malicious code silently on compromised systems.

A thorough analysis by cybersecurity expert Andrey Gunkin from Kaspersky has uncovered how the attackers leverage ESET’s command-line scanner (ecls) to execute their malevolent software. This tactful maneuver enables the malware to go undetected, raising serious concerns about the efficacy of even the most reliable security tools.


How TCESB Evades Detection

Understanding the Malware’s Mechanism

The TCESB malware employs a method known as DLL Search Order Hijacking. This technique tricks the Windows operating system into loading a fraudulent version of a system file, allowing the actual malicious payload to infiltrate the system unnoticed. In a diabolical twist, the malicious file masquerades as version.dll, a legitimate file generally responsible for version-checking operations. When executed, ESET’s scanner inadvertently prioritizes the fake DLL, paving the way for TCESB to gain access to vital system operations.

But that’s not all; Kaspersky’s examination reveals that TCESB is based on EDRSandBlast, an open-source tool adept at evading endpoint detection systems. The ToddyCat hackers didn’t merely exploit this tool; they enhanced its capabilities, making it even more elusive.

The BYOVD Technique: A Closer Look

To fortify its infiltration tactics, the malware ingeniously implements a strategy known as BYOVD (Bring Your Own Vulnerable Driver). In layman’s terms, this technique involves utilizing an outdated, buggy Dell driver (specifically, DBUtilDrv2.sys, which contains vulnerability CVE-2023-36276) to penetrate the system. Once embedded, the TCESB malware continuously checks for an encrypted payload file every two seconds. When the attacker deploys the payload, it seamlessly decrypts and executes without setting off alarms in traditional security software.


Responsive Measures: What Has Been Done?

In response to this vulnerability, ESET was alerted through a responsible disclosure protocol. The issue, designated as CVE-2024-11859, was promptly patched by ESET in January. The company made an announcement on its security advisory, categorizing the flaw as a medium-severity issue with a CVSS score of 6.8.


Implications for Users and Organizations

A Wake-Up Call for Cybersecurity

This incident serves as a poignant reminder that even the most trusted cybersecurity software can be weaponized against its users. The TCESB attack reveals how vulnerable complex systems can be, merging old exploits with sophisticated programming to conceal malicious activity.

Security experts urge that IT teams take immediate action, including:

  • Update ESET software to close the vulnerability gap.
  • Monitor systems for outdated or vulnerable drivers that can compromise security.
  • Be vigilant for unexpected downloads of Windows debug files, which may indicate probing attempts into the system.

Furthermore, Kaspersky’s researchers recommend regularly verifying all loaded system library files to confirm they are digitally signed and untampered.


In conclusion, the ToddyCat hackers’ use of the ESET flaw to launch the TCESB attack is a stark signal of the evolving landscape of cybersecurity threats. Organizations must remain proactive, ensuring their defenses are robust enough to withstand such stealthy intrusions, protecting their digital environments from lurking dangers.


For further reading on cybersecurity best practices, explore eSecurity Planet’s resources.

Subscribe To Our Newsletter

Get updates and learn from the best

More To Explore

Check all Categories of Articles

Do You Want To Boost Your Business?

drop us a line and keep in touch
franetic-agencia-de-marketing-digital-entre-em-contacto