Blog, News & Press Releases - Field Effect

‘TheWizards’ exploit IPv6 feature as part of AitM attacks

Written by Field Effect Security Intelligence Team | May 2, 2025 1:56:04 PM

A China-aligned advanced persistent threat (APT) group, known as "TheWizards," has been exploiting an IPv6 networking feature to hijack software updates and deploy malware on Windows systems.

This technique leverages the Stateless Address Autoconfiguration (SLAAC) capability inherent in IPv6, which allows devices to automatically configure their IP addresses and default gateways without manual intervention. By sending spoofed Router Advertisement (RA) messages, the attackers can manipulate network configurations, redirecting traffic through malicious gateways under their control.

The group's custom tool, dubbed "Spellbinder," facilitates these attacks by broadcasting fraudulent RA messages over local networks. Consequently, affected systems adopt attacker-specified DNS servers and gateways, enabling adversary-in-the-middle (AitM) attacks. This approach allows the interception and potential alteration of network traffic, including software update requests.

Notably, applications that retrieve updates over unsecured HTTP connections are particularly vulnerable, as the attackers can serve malicious payloads in place of legitimate updates.

Active since at least 2022, TheWizards have targeted various entities across the Philippines, Cambodia, the United Arab Emirates, China, and Hong Kong, focusing on individuals, gambling companies, and other organizations.

The exploitation of SLAAC in these attacks underscores the need for enhanced security measures, such as securing software update mechanisms with HTTPS and implementing network protections against unauthorized RA messages.

Source: Bleeping Computer

Analysis

IPv6 (Internet Protocol version 6) was created to solve a fundamental limitation of its predecessor, IPv4: address exhaustion. IPv4 allows for around 4.3 billion unique IP addresses, which seemed sufficient in the early days of the internet—but with the explosion of smartphones, IoT devices, and cloud services, that pool quickly proved inadequate. IPv6 expands the available address space exponentially, supporting 340 undecillion addresses.

Adoption of IPv6 is steadily increasing—especially in mobile networks and newer deployments—because many ISPs and cloud providers now support it by default. According to Google, as of 2025, around 45–50% of global internet traffic uses IPv6, but usage varies widely by country and network provider.

While TheWizard’s exploitation of IPv6 is relatively novel, it does build on previous warnings from security researchers about the risks of unauthenticated IPv6 mechanisms. Similar abuse of SLAAC and RA spoofing has been demonstrated in red team and academic contexts for years, but real-world exploitation by a state-sponsored APT like TheWizards highlights a shift from theory to practice.

It serves as a reminder that IPv6, while essential for the future of networking, also introduces new and often under-monitored attack surfaces that adversaries are now beginning to exploit at scale.

Mitigation

Field Effect’s elite team of Security Intelligence professionals constantly monitor the cyber threat landscape for vulnerabilities and shortcomings discovered in protocols like IPv6. 

Field Effect strongly recommends that organizations disable IPv6 in TCP/IP settings if it is not used. Additionally, organizations should monitor IPv6 traffic for suspicious connections

Related Articles