Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Beware of Malicious Steam Cleanup Tool Attack Windows Machines to Deploy Backdoor Malware

Beware of Malicious Steam Cleanup Tool Attack Windows Machines to Deploy Backdoor Malware

Posted on November 12, 2025November 12, 2025 By CWS

A complicated backdoor malware marketing campaign has emerged focusing on Home windows customers by means of a weaponized model of SteamCleaner, a official open-source utility designed to wash junk information from the Steam gaming platform.

The malware establishes persistent entry to compromised methods by deploying malicious Node.js scripts that keep steady communication with command-and-control servers, enabling attackers to execute arbitrary instructions remotely.

The risk actors have weaponized the official SteamCleaner instrument, which has not acquired updates since September 2018, by injecting malicious code into the unique supply and distributing it by means of fraudulent web sites posing as unlawful software program repositories.

Customers looking for cracked software program or keygens are redirected to GitHub repositories internet hosting the malware, which is delivered as Setup.exe.

The malicious installer is signed with a legitimate digital certificates from Taiyuan Jiankang Expertise Co., Ltd., lending false legitimacy to the 4.66MB package deal and permitting it to bypass preliminary safety scrutiny.

Upon execution, the malware installs itself within the C:Program FilesSteam Cleaner listing, deploying a number of parts together with Steam Cleaner.exe (3,472KB), configuration information, and batch scripts.

SteamCleaner supply code launched on Github (Supply – ASEC)

ASEC safety researchers recognized that the attackers maintained the unique SteamCleaner performance whereas incorporating subtle anti-sandbox detection mechanisms.

The malware performs in depth environmental checks together with system info evaluation, port enumeration, WMI queries, and course of monitoring.

When a sandboxed surroundings is detected, the malware executes solely the official cleansing performance with out triggering malicious conduct.

The payload supply mechanism depends on encrypted PowerShell instructions embedded inside the malware.

Malware signature and attribute info (Supply – ASEC)

These instructions orchestrate the set up of Node.js on the sufferer’s system and subsequently obtain two distinct malicious scripts from separate command-and-control infrastructure.

Each scripts are registered with the Home windows Activity Scheduler to make sure persistence, executing robotically at system startup and repeating each hour thereafter.

Command-and-Management Communication Protocol

The 2 Node.js scripts set up bidirectional communication channels with their respective C2 servers by means of structured JSON payloads.

When connecting to the C2 infrastructure, the malware transmits complete system reconnaissance knowledge together with OS sort and model, hostname, system structure, and a singular machine identifier derived from the gadget GUID.

The primary script, put in at C:WCM{UUID}UUID and registered as Microsoft/Home windows/WCM/WiFiSpeedScheduler, connects to a number of C2 domains together with rt-guard[.]com, 4tressx[.]com, kuchiku[.]digital, and screenner[.]com.

This script downloads information from attacker-specified URLs and executes them utilizing CMD or PowerShell processes.

The second script operates from C:WindowsSetting{UUID}UUID with the duty title Microsoft/Home windows/Prognosis/Beneficial DiagnosisScheduler, speaking with aginscore[.]com.

This variant employs extra aggressive obfuscation strategies and executes instructions immediately by means of Node[.]js’s native shell execution perform.

The C2 communication happens by means of two major endpoints: /d for receiving instructions and /e for transmitting execution outcomes.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, Backdoor, Beware, Cleanup, Deploy, Machines, Malicious, Malware, Steam, Tool, Windows

Post navigation

Previous Post: Multiple Apache OpenOffice Vulnerabilities Leads to Memory Corruption and Unauthorized Content Loading
Next Post: Why Your Business Needs Live Threat Intel from 15K SOCs

Related Posts

Threat actors Allegedly Claim Discord Dataset Containing 78,541,207 Files Threat actors Allegedly Claim Discord Dataset Containing 78,541,207 Files Cyber Security News
HardBit 4.0 Ransomware Actors Attack Open RDP and SMB Services to Persist Access HardBit 4.0 Ransomware Actors Attack Open RDP and SMB Services to Persist Access Cyber Security News
Ransomware Disrupts BridgePay’s Nationwide Payment Processing Ransomware Disrupts BridgePay’s Nationwide Payment Processing Cyber Security News
3,280,081 Fortinet Devices Online With Exposed Web Properties Under Risk 3,280,081 Fortinet Devices Online With Exposed Web Properties Under Risk Cyber Security News
Threat Actors Actively Hacking Websites to Inject Malicious Links and Boost their SEO Threat Actors Actively Hacking Websites to Inject Malicious Links and Boost their SEO Cyber Security News
Threat Actors Weaponizing Visual Studio Code to Deploy a Multistage Malware Threat Actors Weaponizing Visual Studio Code to Deploy a Multistage Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News