• Hello and welcome! Register to enjoy full access and benefits:

    • Advertise in the Marketplace section for free.
    • Get more visibility with a signature link.
    • Company/website listings.
    • Ask & answer queries.
    • Much more...

    Register here or log in if you're already a member.

  • 🎉 WHV has crossed 35,000 monthly views (unique) and 208,000 clicks per month, as per Google Analytics! Thank you for your support! 🎉

China-Backed Hackers Exploit Lanscope Vulnerability in Zero-Day Attacks

johny899

New Member
Content Writer
Messages
683
Reaction score
3
Points
23
Balance
$845.0USD
There has been a very interesting but serious cyber-attack in the news lately. Hackers affiliated with China exploited a zero-day strategy a vulnerability in a Lanscope Endpoint Manager to access a person's organizational systems. I know pretty technical or confusing, but don't worry, I will explain it to you.

What Is It All About​

Research teams found that a hacking group called, Tick (also known as Bronze Butler) exploited a vulnerability in Lanscope application, organizations use this program to manage their computers and networks.

This particular vulnerability CVE-2025-61932, allowed the hackers to execute and run code they wanted on the compromised systems. In other words, they had king power and access to run what they wanted - like having the master key to someone's computer.

The hack even started before anyone knew that this vulnerability existed, hence the misleadingly called zero-day. The developers of Lanscape learned of the existence of the vulnerability and released a patch version to fix the vulnerability in October 20, 2025. The US government agency CISA added it to their "must fix" list, and recommended it should be patched before November 12.

Why This Matters​

You may be thinking, "So what?" Here are some reasons why this matters:
  • Lanscope is the de facto management tool used by many organizations. If a hacker is in Lanscope, they own the whole environment.
  • The attackers used Lanscope to deliver a backdoor in the organization (the backdoor was identified as Gokcpdoor), that connected back to the attackers server through a covert channel.
  • The attackers also used techniques such as dynamic link library (DLL) sideloading, remote desktop access, and even cloud-based access to extract data quietly.
  • The attackers could observe the network, exfiltrate data, and even remove the evidence of carrying out these activities.
That is a significant breach - all due to a software vulnerability!

How Lanscope Fixed It​

Lanscope's team acted with urgency:

• They patched the bug with a security update.
• They informed all customers to apply the security patch immediately.
• Security agencies also shared detection measures to assist organizations in identifying if they were compromised.

That's a fairly brisk and responsible response, however, the damage highlights the dangers of zero day flaws.

If The Following Is Considered Advice​

If your organization is utilizing Lanscope, don't procrastinate - upgrade it now.

It may also be prudent to:
  • Check whether any suspicious apps or files were added recently.
  • Restrict access to management tools, like Lanscope.
  • Monitor for bizarre network activity, including strange uploads or remote session start times.
A little forethought can prevent a lot of grief later on.
 
Top