
A China-aligned APT threat actor named "TheWizards" abuses an IPv6 networking feature to launch adversary-in-the-middle (AitM) attacks that hijack software updates to install Windows malware.
According to ESET, the group has been active since at least 2022, targeting entities in the Philippines, Cambodia, the United Arab Emirates, China, and Hong Kong. Victims include individuals, gambling companies, and other organizations.
The attacks utilize a custom tool dubbed "Spellbinder" by ESET that abuses the IPv6 Stateless Address Autoconfiguration (SLAAC) feature to conduct SLACC attacks.
SLAAC is a feature of the IPv6 networking protocol that allows devices to automatically configure their own IP addresses and default gateway without needing a DHCP server. Instead, it utilizes Router Advertisement (RA) messages to receive IP addresses from IPv6-supported routers.
The hacker's Spellbinder tool abuses this feature by sending spoofed RA messages over the network, causing nearby systems to automatically receive a new IPv6 IP address, new DNS servers, and a new, preferred IPv6 gateway.
This default gateway, though, is the IP address of the Spellbinder tool, which allows it to intercept communications and reroute traffic through attacker-controlled servers.
"Spellbinder sends a multicast RA packet every 200 ms to ff02::1 ("all nodes"); Windows machines in the network with IPv6 enabled will autoconfigure via stateless address autoconfiguration (SLAAC) using information provided in the RA message, and begin sending IPv6 traffic to the machine running Spellbinder, where packets will be intercepted, analyzed, and replied to where applicable," explains ESET.

Source: ESET
ESET said attacks deploy Spellbinder using an archive named AVGApplicationFrameHostS.zip, which extracts into a directory mimicking legitimate software: "%PROGRAMFILES%\AVG Technologies."
Within this directory are AVGApplicationFrameHost.exe, wsc.dll, log.dat, and a legitimate copy of winpcap.exe. The WinPcap executable is used to side-load the malicious wsc.dll, which loads Spellbinder into memory.
Once a device is infected, Spellbinder begins capturing and analyzing network traffic attempting to connect specific domains, such as those related to Chinese software update servers.
ESET says the malware monitors for domains belonging to the following companies: Tencent, Baidu, Xunlei, Youku, iQIYI, Kingsoft, Mango TV, Funshion, Yuodao, Xiaomi, Xiaomi Miui, PPLive, Meitu, Quihoo 360, and Baofeng.
The tool then redirects those requests to download and install malicious updates that deploy a backdoor named "WizardNet."
The WizardNet backdoor gives attackers persistent access to the infected device and allows them to install additional malware as needed.
To protect against these types of attacks, organizations can monitor IPv6 traffic or turn off the protocol if it is not required in their environment.
In January, ESET also reported on another hacking group named "Blackwood" hijacking the WPS Office software update feature to install malware.
99% of What Mythos Found Is Still Unpatched.
AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.
At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what's exploitable, proves controls hold, and closes the remediation loop.





Comments
Natenate - 11 months ago
How do these attacks tamper with TLS connections? I'm assuming all Windows update communication uses TLS, and needn't be trusting the local network.
deltasierra - 11 months ago
"The tool then redirects those requests to download and install malicious updates that deploy a backdoor named "WizardNet."
First, they are using the attacker's DNS servers, so the victim's DNS is poisoned. This means TLS doesn't need to be direclty tampered with, at least not yet.
"The WizardNet backdoor gives attackers persistent access to the infected device and allows them to install additional malware as needed."
Once the poisoned DNS allows the initial backdoor to get downloaded and installed on the device, additional malware can mess with TLS (downgrade attack and attempt to MitM or even just mirror traffic, log keystrokes, etc., i.e. TLS isn't protective from the attacker at this point).
Natenate - 11 months ago
I'm interested to know how they escalate from hijacked DNS and default route to getting code running on the victim's machine. If they successfully redirect https://windowsupdate.microsoft.com to their own server, the TLS cert validation should fail such that the client wouldn't trust that host. I assume there's some additional vulnerability being exploited here.
anonmosses - 11 months ago
I think the article is missing something. It says update checks over HTTP, not HTTPS. If that is the case TLS is not in the picture. Looks like there is still some HTTP in play in Windows Updates https://www.quora.com/Does-the-Windows-update-use-HTTP but not without another form of crypto verification. I think the article is missing something.
deltasierra - 11 months ago
In the modern Microsoft OS world, IPv6 shouldn't be disabled on client machines. See below.
"Internet Protocol version 6 (IPv6) is a mandatory part of Windows Vista and Windows Server 2008 and newer versions.
We don't recommend that you disable IPv6 or IPv6 components or unbind IPv6 from interfaces. If you do, some Windows components might not function.
We recommend using Prefer IPv4 over IPv6 in prefix policies instead of disabling IPV6."
https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/configure-ipv6-in-windows
Drags - 11 months ago
"In the modern Microsoft OS world, IPv6 shouldn't be disabled on client machines. See below.
"Internet Protocol version 6 (IPv6) is a mandatory part of Windows Vista and Windows Server 2008 and newer versions.
We don't recommend that you disable IPv6 or IPv6 components or unbind IPv6 from interfaces. If you do, some Windows components might not function.
We recommend using Prefer IPv4 over IPv6 in prefix policies instead of disabling IPV6."https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/configure-ipv6-in-windows"
and yet even to this day some fixes / bugs require that you turn off v6.