• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
experts warn of stealthy powershell backdoor disguising as windows update

Experts Warn of Stealthy PowerShell Backdoor Disguising as Windows Update

You are here: Home / General Cyber Security News / Experts Warn of Stealthy PowerShell Backdoor Disguising as Windows Update
October 19, 2022

Details have emerged about a previously undocumented and fully undetectable (FUD) PowerShell backdoor that gains its stealth by disguising itself as component of a Windows update approach.

“The covert self-created software and the affiliated C2 commands look to be the perform of a advanced, not known threat actor who has qualified somewhere around 100 victims,” Tomer Bar, director of security investigate at SafeBreach, reported in a new report.

Attributed to an unnamed threat actor, attack chains involving the malware begin with a weaponized Microsoft Term document that, for every the organization, was uploaded from Jordan on August 25, 2022.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


CyberSecurity

Metadata affiliated with the entice document implies that the original intrusion vector is a LinkedIn-primarily based spear-phishing attack, which finally potential customers to the execution of a PowerShell script by using a piece of embedded macro code.

PowerShell Backdoor

The PowerShell script (Script1.ps1) is developed to join to a remote command-and-command (C2) server and retrieve a command to be released on the compromised equipment by signifies of a next PowerShell script (temp.ps1).

But an operational security mistake designed by the actor by applying a trivial incremental identifier to uniquely establish every single victim (i.e., , 1, 2, and many others.) permitted for reconstructing the commands issued by the C2 server.

CyberSecurity

Some of the noteworthy commands issued consist of exfiltrating the record of functioning processes, enumerating files in particular folders, launching whoami, and deleting information underneath the community person folders.

As of composing, 32 security suppliers and 18 anti-malware engines flag the decoy doc and the PowerShell scripts as malicious, respectively.

The conclusions appear as Microsoft has taken steps to block Excel 4. (XLM or XL4) and Visible Simple for Purposes (VBA) macros by default throughout Business applications, prompting threat actors to pivot to choice shipping strategies.

Uncovered this post appealing? Comply with THN on Facebook, Twitter  and LinkedIn to examine much more exclusive material we write-up.


Some pieces of this article are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Digital Natives Are Undermining Corporate Security – Report
Next Post: How to trust your inbox with Cloudflare Area 1 how to trust your inbox with cloudflare area 1»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.