Meet BITSLOTH: The Sneaky Sloth of Cyber Espionage Unveiled!
Cybersecurity researchers have discovered a sneaky Windows backdoor, codenamed BITSLOTH, that uses the Background Intelligent Transfer Service (BITS) for command-and-control. This malware has been found targeting a South American government and is suspected to be linked to Chinese threat actors. Talk about a slo-mo cyber heist!

Hot Take:
When Windows gives you BITS, why not make a full-course cyber attack? Meet BITSLOTH, the malware that proves even your computer’s background chores can be hijacked for a bit of espionage. Talk about multitasking!
Key Points:
- New backdoor malware named BITSLOTH discovered by Elastic Security Labs.
- BITSLOTH uses Windows’ Background Intelligent Transfer Service (BITS) for command-and-control (C2).
- Malware includes 35 handler functions, such as keylogging and screen capture.
- Associated with Chinese-speaking threat actors and open-source encryption tool RingQ.
- Malware leverages legitimate software (FL Studio) for DLL side-loading.
Already a member? Log in here