
| Names | Spellbinder | |
| Category | Malware | |
| Type | Backdoor, Tunneling, Downloader | |
| Description | (ESET) Spellbinder enables adversary-in-the-middle (AitM) attacks, through IPv6 stateless address autoconfiguration (SLAAC) spoofing, to move laterally in the compromised network, intercepting packets and redirecting the traffic of legitimate Chinese software so that it downloads malicious updates from a server controlled by the attackers. | |
| Information | <https://www.welivesecurity.com/en/eset-research/thewizards-apt-group-slaac-spoofing-adversary-in-the-middle-attacks/> | |
Last change to this tool card: 27 June 2025
Download this tool card in JSON format
| Changed | Name | Country | Observed | ||
APT groups | |||||
| TheWizards | 2022 | ||||
1 group listed (1 APT, 0 other, 0 unknown)
|
Infrastructure and Security Department Follow us on |
Report incidents |
|
| +66 (0)2-123-1227 | ||
| [email protected] | ||