China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
The exploitation of a recently disclosed critical security flaw in Motex Lanscope Endpoint Manager has been attributed to a cyber espionage group known as Tick. The vulnerability, tracked as CVE-2025-61932 (CVSS score: 9.3), allows remote attackers to execute arbitrary commands with SYSTEM privileges on on-premise versions of the program. JPCERT/CC, in an alert issued this month, said that it
AI Analysis
Technical Summary
The threat centers on a critical zero-day vulnerability identified as CVE-2025-61932 in Motex Lanscope Endpoint Manager, a widely used endpoint management solution. This vulnerability allows remote attackers to execute arbitrary commands with SYSTEM privileges on on-premise Lanscope servers, effectively granting full control over affected systems. The exploitation has been attributed to the Tick group, a sophisticated Chinese cyber espionage actor active since at least 2006, known for targeting East Asian entities but now expanding its reach. The attackers use the vulnerability to deploy a backdoor named Gokcpdoor, which supports multiplexed communication channels via the smux library, replacing older protocols to evade detection. Gokcpdoor operates in two modes: a server type that listens for incoming connections and a client type that initiates connections to hard-coded command-and-control servers, enabling covert remote control. The attack chain involves DLL side-loading to launch a loader called OAED Loader, which injects malicious payloads. Post-exploitation tools include the Havoc framework for further system control, goddi for Active Directory information gathering, and Remote Desktop for lateral movement through backdoor tunnels. Data exfiltration is facilitated by accessing cloud services such as io, LimeWire, and Piping Server during remote desktop sessions. This campaign reflects Tick’s continued use of zero-day exploits to compromise high-value targets, emphasizing the criticality of this Lanscope vulnerability. The lack of publicly available patches at the time of reporting and the exposure of Lanscope servers to the internet exacerbate the risk.
Potential Impact
For European organizations, the exploitation of this Lanscope zero-day poses severe risks including full system compromise, unauthorized data access, and espionage. Organizations relying on Lanscope Endpoint Manager for IT asset management and endpoint security could see critical infrastructure and sensitive data exposed. The SYSTEM-level code execution enables attackers to bypass most security controls, deploy persistent backdoors, and move laterally within networks, increasing the likelihood of widespread compromise. The use of advanced post-exploitation tools and cloud services for data exfiltration complicates detection and response efforts. Given the espionage nature of Tick, organizations in sectors such as government, defense, technology, and critical infrastructure are particularly at risk. The potential for intellectual property theft, disruption of operations, and reputational damage is significant. Additionally, the exposure of Lanscope servers to the internet increases the attack surface, making European entities with public-facing Lanscope deployments especially vulnerable.
Mitigation Recommendations
European organizations should immediately identify and isolate all Lanscope Endpoint Manager servers, especially those exposed to the internet. Until official patches are available, organizations should implement network segmentation to restrict Lanscope server access to trusted internal networks only. Employ strict firewall rules to block external access to Lanscope management ports and services. Conduct thorough audits to detect any signs of compromise, including unusual DLL loads, presence of Gokcpdoor backdoors, and anomalous network traffic indicative of smux multiplexing or communication with known C2 servers. Deploy endpoint detection and response (EDR) tools capable of detecting DLL side-loading and post-exploitation frameworks like Havoc. Enhance monitoring of Active Directory queries and Remote Desktop sessions for suspicious activity. Implement strict credential hygiene and multi-factor authentication to limit lateral movement. Regularly update and patch Lanscope software as soon as vendors release fixes. Finally, conduct threat hunting exercises focused on IoCs related to Tick group activity and educate security teams on this specific threat vector.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Finland
China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
Description
The exploitation of a recently disclosed critical security flaw in Motex Lanscope Endpoint Manager has been attributed to a cyber espionage group known as Tick. The vulnerability, tracked as CVE-2025-61932 (CVSS score: 9.3), allows remote attackers to execute arbitrary commands with SYSTEM privileges on on-premise versions of the program. JPCERT/CC, in an alert issued this month, said that it
AI-Powered Analysis
Technical Analysis
The threat centers on a critical zero-day vulnerability identified as CVE-2025-61932 in Motex Lanscope Endpoint Manager, a widely used endpoint management solution. This vulnerability allows remote attackers to execute arbitrary commands with SYSTEM privileges on on-premise Lanscope servers, effectively granting full control over affected systems. The exploitation has been attributed to the Tick group, a sophisticated Chinese cyber espionage actor active since at least 2006, known for targeting East Asian entities but now expanding its reach. The attackers use the vulnerability to deploy a backdoor named Gokcpdoor, which supports multiplexed communication channels via the smux library, replacing older protocols to evade detection. Gokcpdoor operates in two modes: a server type that listens for incoming connections and a client type that initiates connections to hard-coded command-and-control servers, enabling covert remote control. The attack chain involves DLL side-loading to launch a loader called OAED Loader, which injects malicious payloads. Post-exploitation tools include the Havoc framework for further system control, goddi for Active Directory information gathering, and Remote Desktop for lateral movement through backdoor tunnels. Data exfiltration is facilitated by accessing cloud services such as io, LimeWire, and Piping Server during remote desktop sessions. This campaign reflects Tick’s continued use of zero-day exploits to compromise high-value targets, emphasizing the criticality of this Lanscope vulnerability. The lack of publicly available patches at the time of reporting and the exposure of Lanscope servers to the internet exacerbate the risk.
Potential Impact
For European organizations, the exploitation of this Lanscope zero-day poses severe risks including full system compromise, unauthorized data access, and espionage. Organizations relying on Lanscope Endpoint Manager for IT asset management and endpoint security could see critical infrastructure and sensitive data exposed. The SYSTEM-level code execution enables attackers to bypass most security controls, deploy persistent backdoors, and move laterally within networks, increasing the likelihood of widespread compromise. The use of advanced post-exploitation tools and cloud services for data exfiltration complicates detection and response efforts. Given the espionage nature of Tick, organizations in sectors such as government, defense, technology, and critical infrastructure are particularly at risk. The potential for intellectual property theft, disruption of operations, and reputational damage is significant. Additionally, the exposure of Lanscope servers to the internet increases the attack surface, making European entities with public-facing Lanscope deployments especially vulnerable.
Mitigation Recommendations
European organizations should immediately identify and isolate all Lanscope Endpoint Manager servers, especially those exposed to the internet. Until official patches are available, organizations should implement network segmentation to restrict Lanscope server access to trusted internal networks only. Employ strict firewall rules to block external access to Lanscope management ports and services. Conduct thorough audits to detect any signs of compromise, including unusual DLL loads, presence of Gokcpdoor backdoors, and anomalous network traffic indicative of smux multiplexing or communication with known C2 servers. Deploy endpoint detection and response (EDR) tools capable of detecting DLL side-loading and post-exploitation frameworks like Havoc. Enhance monitoring of Active Directory queries and Remote Desktop sessions for suspicious activity. Implement strict credential hygiene and multi-factor authentication to limit lateral movement. Regularly update and patch Lanscope software as soon as vendors release fixes. Finally, conduct threat hunting exercises focused on IoCs related to Tick group activity and educate security teams on this specific threat vector.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/10/china-linked-tick-group-exploits.html","fetched":true,"fetchedAt":"2025-11-01T01:10:55.413Z","wordCount":1048}
Threat ID: 69055e2471a6fc4aff34f138
Added to database: 11/1/2025, 1:11:00 AM
Last enriched: 11/1/2025, 1:11:40 AM
Last updated: 11/1/2025, 4:00:19 PM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Flowise 3.0.4 - Remote Code Execution (RCE)
CriticalActive Exploits Hit Dassault and XWiki — CISA Confirms Critical Flaws Under Attack
CriticalCISA Warns of Exploited DELMIA Factory Software Vulnerabilities
MediumAttackers Sell Turnkey Remote Access Trojan 'Atroposia'
LowYear-Old WordPress Plugin Flaws Exploited to Hack Websites
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.