www.rivitmedia.comwww.rivitmedia.comwww.rivitmedia.com
  • Home
  • Tech News
    Tech NewsShow More
    Microsoft’s May 2025 Patch Tuesday: Five Actively Exploited Zero-Day Vulnerabilities Addressed
    7 Min Read
    Malicious Go Modules Unleash Disk-Wiping Chaos in Linux Supply Chain Attack
    4 Min Read
    Agentic AI: Transforming Cybersecurity in 2025
    3 Min Read
    Cybersecurity CEO Accused of Planting Malware in Hospital Systems: A Breach of Trust That Shocks the Industry
    6 Min Read
    Cloud Convenience, Criminal Opportunity: How Google Sites Became a Launchpad for Elite Phishing
    6 Min Read
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
    • Microsoft CVE Errors
  • How-To-Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
  • FREE SCAN
  • Cybersecurity for Business
Search
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2023 rivitMedia.com. All Rights Reserved.
Reading: Remove Sagerunex Malware Variants (Lotus Panda Cyber Espionage Threat)
Share
Notification Show More
Font ResizerAa
www.rivitmedia.comwww.rivitmedia.com
Font ResizerAa
  • Online Scams
  • Tech News
  • Cyber Threats
  • Mac Malware
  • Cybersecurity for Business
  • FREE SCAN
Search
  • Home
  • Tech News
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
  • How-To-Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
    • Cybersecurity for Business
  • FREE SCAN
  • Sitemap
Follow US
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
www.rivitmedia.com > Blog > Cyber Threats > Malware > Remove Sagerunex Malware Variants (Lotus Panda Cyber Espionage Threat)
MalwareTrojans

Remove Sagerunex Malware Variants (Lotus Panda Cyber Espionage Threat)

A Highly Evasive Cyberattack Targeting Asia-Pacific Organizations

riviTMedia Research
Last updated: March 9, 2025 2:36 pm
riviTMedia Research
Share
Remove Sagerunex Malware Variants (Lotus Panda Cyber Espionage Threat)
SHARE

The advanced persistent threat (APT) group Lotus Panda, also known as Billbug, Bronze Elgin, Lotus Blossom, Spring Dragon, and Thrip, has been launching cyberattacks on high-profile targets across the Philippines, Vietnam, Hong Kong, and Taiwan. These attacks primarily leverage Sagerunex, a sophisticated backdoor malware that has been evolving since at least 2016.

Contents
Summary of Sagerunex Malware VariantsA Deepening Cyber ThreatHistory of Lotus Panda’s Cyber IntrusionsNew Sagerunex VariantsHow Sagerunex WorksAdditional Malware Deployed by Lotus PandaNetwork Reconnaissance and Stealth TacticsManual Removal of Backdoor MalwareStep 1: Restart in Safe Mode with NetworkingStep 2: Terminate Malicious Processes in Task ManagerStep 3: Delete Suspicious Files from System FoldersStep 4: Remove Malicious Entries from the Windows RegistryStep 5: Reset Browser SettingsGoogle ChromeMozilla FirefoxMicrosoft EdgeStep 6: Scan for Remaining ThreatsRemove Backdoor Malware with SpyHunter (Recommended)Step 1: Download SpyHunterStep 2: Install SpyHunterStep 3: Perform a Full System ScanStep 4: Remove Detected MalwareStep 5: Enable SpyHunter's Real-Time ProtectionHow to Prevent Backdoor Malware InfectionsAn Ongoing Cyber Threat

Lotus Panda is a suspected Chinese hacking group that has been active since at least 2009. They specialize in long-term espionage campaigns, targeting government agencies, telecommunications firms, manufacturing companies, and media organizations. Their ability to refine attack methods and leverage legitimate services for stealth makes them one of the most formidable cyber threats in the Asia-Pacific region.

Summary of Sagerunex Malware Variants

Threat AttributeDetails
Threat TypeBackdoor malware, Cyber Espionage Tool
Threat ActorLotus Panda (aka Billbug, Bronze Elgin, Lotus Blossom, Spring Dragon, Thrip)
Affected RegionsPhilippines, Vietnam, Hong Kong, Taiwan
Detection NamesBackdoor.Sagerunex, Backdoor.Evora, Trojan.Sagerunex
Infection SymptomsSlow system performance, Unusual network traffic, Unrecognized emails in Zimbra accounts, Unusual files in browser caches, Suspicious processes running in Task Manager
Damage PotentialData exfiltration, Unauthorized system access, Credential theft, Persistent backdoor access
Distribution MethodsWatering hole attacks, Spear-phishing emails, Fake software updates, Exploiting trusted cloud services (Dropbox, X, Zimbra)
Danger LevelVery High – Used in cyber espionage against critical infrastructure

Scan Your System for Viruses

✅ Free Scan Available 

✅13M Scans/Month

✅Instant Detection

Download SpyHunter for Free

✅ Removes ransomware

✅ Prevents scams

✅ Detects trojans

Don’t leave your system unprotected. Download SpyHunter today for free, and scan your device for malware, scams, or any other potential threats. Stay Protected!

A Deepening Cyber Threat

History of Lotus Panda’s Cyber Intrusions

Lotus Panda has a long track record of targeting critical infrastructure. In 2022, the group was linked to cyber intrusions at a digital certificate authority and multiple government and defense agencies across Asia. Their toolset includes highly effective backdoors like Hannotog and Sagerunex, which allow attackers to maintain persistent access to compromised systems.

While the initial infection method remains unclear, Lotus Panda is known to use watering hole attacks and spear-phishing campaigns to gain access to networks. Once inside, they deploy Sagerunex, which is believed to be an evolution of an earlier malware strain known as Evora.

New Sagerunex Variants

Security researchers have identified two new “beta” variants of Sagerunex in recent attacks. These versions exploit legitimate cloud services such as Dropbox, X (formerly Twitter), and Zimbra Webmail as covert Command-and-Control (C2) channels to evade detection.

How Sagerunex Works

  • Collects system data and encrypts it for exfiltration.
  • Hides within legitimate services to avoid detection.
  • Executes remote commands sent via email content in Zimbra Webmail.
  • Uses RAR archives to store stolen data in email draft and trash folders.

This advanced level of covert control allows hackers to steal sensitive data and execute commands remotely, making Sagerunex an exceptionally dangerous cyber weapon.

Additional Malware Deployed by Lotus Panda

In addition to Sagerunex, Lotus Panda uses various tools to infiltrate, maintain persistence, and exfiltrate data:

  • A cookie stealer that harvests Chrome browser credentials.
  • Venom, an open-source proxy tool used to bypass network restrictions.
  • A privilege escalation tool to gain higher access rights on infected machines.
  • Custom encryption software to securely package and exfiltrate stolen data.

Network Reconnaissance and Stealth Tactics

Lotus Panda’s attacks typically involve extensive reconnaissance before executing major actions. Their malware runs system commands such as:

  • net, tasklist, ipconfig, netstat – to gather network and system information.
  • Internet connectivity checks – to determine if the malware can establish external communication.
  • Proxy settings exploitation – if internet access is restricted, attackers use Venom proxy to establish an indirect connection.

Manual Removal of Backdoor Malware

(Note: Manual removal can be complex and risky. If performed incorrectly, it may cause system instability. Proceed with caution or use the automated SpyHunter method below.)

Step 1: Restart in Safe Mode with Networking

To prevent the backdoor malware from running, restart your computer in Safe Mode with Networking:

  1. Press Windows + R, type msconfig, and press Enter.
  2. Navigate to the Boot tab.
  3. Check Safe boot and select Network.
  4. Click Apply > OK and restart your PC.

Step 2: Terminate Malicious Processes in Task Manager

  1. Press Ctrl + Shift + Esc to open Task Manager.
  2. Look for suspicious processes that may be linked to the backdoor malware. Common signs include:
    • Unrecognized processes consuming high CPU or memory.
    • Randomly named processes (e.g., svchost32.exe, systemupdate.exe).
  3. Right-click on any suspicious process and select End Task.

Step 3: Delete Suspicious Files from System Folders

  1. Press Windows + R, type %AppData% and press Enter.
  2. Check for suspicious folders and files, such as unknown .exe or .dll files.
  3. Navigate to the following locations and remove suspicious files:
    • C:\Users\YourUserName\AppData\Local
    • C:\Users\YourUserName\AppData\Roaming
    • C:\ProgramData
    • C:\Windows\System32\drivers
    • C:\Windows\Temp

Step 4: Remove Malicious Entries from the Windows Registry

  1. Press Windows + R, type regedit, and hit Enter.
  2. Navigate to the following keys:
    • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
    • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
  3. Look for entries with random names or unknown applications.
  4. Right-click and select Delete.

(Caution: Editing the Registry incorrectly can cause serious issues. Back up your registry before making changes.)


Step 5: Reset Browser Settings

Backdoor malware may modify browser settings to redirect traffic or steal credentials. Reset your browsers:

Google Chrome

  1. Open Chrome, type chrome://settings/reset in the address bar, and press Enter.
  2. Click Restore settings to their original defaults > Reset settings.

Mozilla Firefox

  1. Open Firefox, type about:support in the address bar, and press Enter.
  2. Click Refresh Firefox > Confirm.

Microsoft Edge

  1. Open Edge, go to Settings > Reset Settings.
  2. Click Restore settings to their default values > Reset.

Step 6: Scan for Remaining Threats

After manual removal, use Windows Defender or a third-party antivirus to scan your system for remaining threats.

  1. Press Windows + I > Update & Security > Windows Security.
  2. Click Virus & threat protection > Quick Scan.

Remove Backdoor Malware with SpyHunter (Recommended)

Scan Your System for Viruses

✅ Free Scan Available 

✅13M Scans/Month

✅Instant Detection

Download SpyHunter for Free

✅ Removes ransomware

✅ Prevents scams

✅ Detects trojans

Don’t leave your system unprotected. Download SpyHunter today for free, and scan your device for malware, scams, or any other potential threats. Stay Protected!

SpyHunter is a powerful anti-malware tool that can detect and remove backdoor malware without requiring technical expertise.

Step 1: Download SpyHunter

  1. Go to the official SpyHunter download page: Download SpyHunter
  2. Click the Download Now button.
Download SpyHunter 5
Download SpyHunter for Mac

Step 2: Install SpyHunter

  1. Locate the downloaded SpyHunter-Installer.exe file and double-click it.
  2. Follow the on-screen instructions to complete the installation.
  3. Launch SpyHunter after installation.

Step 3: Perform a Full System Scan

  1. Click Start Scan Now.
  2. SpyHunter will scan your system for backdoor malware and other threats.
  3. Once the scan is complete, review the detected threats.

Step 4: Remove Detected Malware

  1. Click Fix Threats to remove all detected malware.
  2. If prompted, restart your computer to complete the removal process.

Step 5: Enable SpyHunter's Real-Time Protection

To prevent future infections:

  1. Open SpyHunter and go to Settings.
  2. Enable Real-Time Malware Protection.
  3. Keep SpyHunter updated to stay protected against the latest threats.

How to Prevent Backdoor Malware Infections

  • To keep your system safe, follow these security best practices:
  • Avoid downloading cracked software – Many backdoors hide in illegal downloads.
  • Keep Windows and software updated – Install security patches regularly.
  • Use strong passwords – Prevent unauthorized remote access.
  • Enable two-factor authentication (2FA) – Adds an extra security layer.
  • Scan email attachments before opening – Phishing emails often carry malware.
  • Use a firewall – Block unauthorized network connections.

An Ongoing Cyber Threat

Lotus Panda’s Sagerunex malware continues to evolve, posing a serious risk to national security, businesses, and critical sectors. The group's ability to use legitimate services for stealth operations makes detection extremely difficult. As they refine their techniques, organizations in the Asia-Pacific region remain at high risk.

Scan Your System for Viruses

✅ Free Scan Available 

✅13M Scans/Month

✅Instant Detection

Download SpyHunter for Free

✅ Removes ransomware

✅ Prevents scams

✅ Detects trojans

Don’t leave your system unprotected. Download SpyHunter today for free, and scan your device for malware, scams, or any other potential threats. Stay Protected!

You Might Also Like

Backdoor:Win32/Yonsole.B – A Stealthy Trojan Horse Threat
Nowzex Scam: A Cryptocurrency Cyber Threat
Webetes.org Adware: A Growing Digital Threat
Mind of Pepe / Mind Airdrop Scam
BehaviorWin32.AMSI.Patch Malware Threat
TAGGED:advanced persistent threatbackdoor malwarebackdoor malware detectionBillbug malwareBillbug threatBronze Elgin APTcyber attack on telecomcyber espionagecyber espionage malwarecyber intelligencecyber threat actorscyber warfarecyberattack on government agenciescybersecurity threat Asia-PacificCybersecurity threatsdata exfiltrationdigital espionageDropbox malware C2espionage malwaregovernment cyberattackshacking campaignshacking groupshacking tacticshacking toolsLotus Blossom hacking groupLotus Panda APTLotus Panda cyber attackLotus Panda cyber operationsmalware analysismalware researchmalware targeting manufacturingmalware variantsnetwork infiltrationphishing backdoor malwarephishing malwareSagerunex backdoorSagerunex malwareSecurity vulnerabilitiesSpring Dragon malwarestate-sponsored hackingstealth malwarethreat actor trackingThrip APTX malware C2Zimbra webmail malware

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Share
Previous Article Remove “Confirm YouTube Partner Program Monetization” Scam
Next Article Remove Hush Ransomware
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Scan Your System for Free

✅ Free Scan Available 

✅ 13M Scans/Month

✅ Instant Detection

Download SpyHunter 5
Download SpyHunter for Mac

//

Check in Daily for the best technology and Cybersecurity based content on the internet.

Quick Link

  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

www.rivitmedia.comwww.rivitmedia.com
© 2023 • rivitmedia.com All Rights Reserved.
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US