Meet BITSLOTH: The Sneaky Sloth of Cyber Espionage Unveiled!

Cybersecurity researchers have discovered a sneaky Windows backdoor, codenamed BITSLOTH, that uses the Background Intelligent Transfer Service (BITS) for command-and-control. This malware has been found targeting a South American government and is suspected to be linked to Chinese threat actors. Talk about a slo-mo cyber…

Hot Take:

When Windows gives you BITS, why not make a full-course cyber attack? Meet BITSLOTH, the malware that proves even your computer’s background chores can be hijacked for a bit of espionage. Talk about multitasking!

Key Points:

  • New backdoor malware named BITSLOTH discovered by Elastic Security Labs.
  • BITSLOTH uses Windows’ Background Intelligent Transfer Service (BITS) for command-and-control (C2).
  • Malware includes 35 handler functions, such as keylogging and screen capture.
  • Associated with Chinese-speaking threat actors and open-source encryption tool RingQ.
  • Malware leverages legitimate software (FL Studio) for DLL side-loading.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here