Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Operation Silk Lure Weaponizing Windows Scheduled Tasks to Drop ValleyRAT

Operation Silk Lure Weaponizing Windows Scheduled Tasks to Drop ValleyRAT

Posted on October 16, 2025October 16, 2025 By CWS

Over the previous month, a focused marketing campaign dubbed Operation Silk Lure has surfaced, exploiting the Home windows Activity Scheduler to deploy a novel variant of ValleyRAT.

Rising in mid-2025, the operation hinges on spear-phishing emails that carry malicious LNK attachments masquerading as candidate resumes.

When victims open these attachments, a hidden PowerShell command initiates the obtain of a decoy doc and two executables: a loader (keytool.exe) and its side-loaded DLL (jli.dll).

Preliminary evaluation reveals that the phishing lure is crafted for Chinese language fintech and buying and selling corporations’ HR departments.

The malicious LNK file comprises an obfuscated PowerShell one-liner, which silently retrieves payloads from a command-and-control (C2) server hosted in the US.

As soon as executed, the dropper writes a VBScript named CreateHiddenTask.vbs into the consumer’s AppData folder, then runs it to determine persistence.

Seqrite researchers famous that this script programmatically registers a every day scheduled process named “Safety,” spoofing Microsoft Company because the writer, and instantly deletes itself to hinder detection.

Following the persistence step, the loader binary (keytool.exe) launches and makes use of DLL side-loading to execute jli.dll.

This DLL locates an 8-byte marker in its personal file, extracts the next encrypted payload, and performs RC4 decryption with a hard-coded key.

An infection chain (Supply – Seqrite)

The decrypted shellcode is injected straight into reminiscence, establishing contact with the C2 server at 206.119.175.16 and starting reconnaissance and exfiltration.

Seqrite researchers famous that when inside, ValleyRAT engages in intensive information harvesting and defense-evasion maneuvers.

It fingerprints the host—accumulating CPU particulars, display screen decision, and NIC data—whereas checking for virtualization or identified antivirus merchandise through WMI queries.

Detected safety companies, together with 360Safe and Kingsoft, have their community connections forcefully terminated. All actions are logged and transmitted covertly over HTTPS, elevating the chance of credential theft and company espionage.

An infection Mechanism and Persistence

A more in-depth take a look at the an infection chain uncovers the class of its persistence tactic. The VBScript used to register the scheduled process leverages COM interfaces to work together with the Activity Scheduler.

Beneath is the core snippet from CreateHiddenTask.vbs:-

Set service = CreateObject(“Schedule.Service”)
service. Join
Set rootFolder = service.GetFolder(“”)
Set taskDef = service.NewTask(0)
With taskDef.RegistrationInfo
.Creator = “Microsoft Company”
Finish With
With taskDef.Triggers.Create(1) ‘ DAILY set off
.StartBoundary = “2025-08-01T08:00:01”
.DaysInterval = 1
Finish With
With taskDef.Actions.Create(0) ‘ EXEC motion
.Path = ExpandEnvironmentStrings(“%APPDATApercentkeytool.exe”)
Finish With
rootFolder.RegisterTaskDefinition “Safety”, taskDef, 6, “”, “”, 3

Upon registration, the duty executes keytool.exe each morning at 8:00 AM. This mechanism ensures the loader runs constantly, even after system reboots.

By embedding writer metadata and deleting the script, the menace actors mix into regular system exercise, complicating forensic investigations.

The mixture of LNK-based preliminary compromise, VBScript persistence, and DLL side-loading makes Operation Silk Lure a classy menace demanding up to date searching signatures and vigilant monitoring of scheduled duties.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Drop, Lure, Operation, Scheduled, Silk, Tasks, ValleyRAT, Weaponizing, Windows

Post navigation

Previous Post: Qilin Ransomware Using Ghost Bulletproof Hosting to Attack Organizations Worldwide
Next Post: LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets

Related Posts

Critical NGINX Vulnerability: Code Execution Risk via MP4 Critical NGINX Vulnerability: Code Execution Risk via MP4 Cyber Security News
What’s Next for SOC in 2026: Get the Early-Adopter Advantage  What’s Next for SOC in 2026: Get the Early-Adopter Advantage  Cyber Security News
New Whisper Leak Toolkit Exposes User Prompts to Popular AI Agents within Encrypted Traffic New Whisper Leak Toolkit Exposes User Prompts to Popular AI Agents within Encrypted Traffic Cyber Security News
Careto Hacker Group is Back After 10 Years of Silence with New Attack Tactics Careto Hacker Group is Back After 10 Years of Silence with New Attack Tactics Cyber Security News
Hackers Weaponizing OAuth Applications for Persistent Cloud Access Even After Password Reset Hackers Weaponizing OAuth Applications for Persistent Cloud Access Even After Password Reset Cyber Security News
Critical RCE Vulnerability in Popular React Native NPM Package Exposes Developers to Attacks Critical RCE Vulnerability in Popular React Native NPM Package Exposes Developers to Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark