Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Moonwalk++ PoC Shows How Malware Can Spoof Windows Call Stacks and Evade Elastic-Inspired Rules

New Moonwalk++ PoC Shows How Malware Can Spoof Windows Call Stacks and Evade Elastic-Inspired Rules

Posted on December 17, 2025December 17, 2025 By CWS

A complicated proof-of-concept demonstrating how malware can bypass superior name stack detection mechanisms more and more adopted by enterprise safety distributors like Elastic.

The brand new Moonwalk++ method extends prior stack-spoofing analysis and divulges vital gaps in present endpoint detection methods.

 possible reminiscence location

The Evasion Problem

As defenders more and more depend on name stack telemetry to establish malicious exercise, attackers are creating extra superior countermeasures.

Introduces strategies to spoof name stacks whereas concurrently encrypting malware in reminiscence capabilities beforehand thought of infeasible.

Elastic Safety Labs lately printed detection logic designed to establish anomalous name stacks by analyzing execution patterns, caller identification, and reminiscence traits.

Spoof goal operate

Moonwalk++ circumvents these protections by way of a number of evasion vectors. The PoC demonstrates three vital bypasses:

Name Instruction Validation Bypass: Detection programs test whether or not directions previous return addresses are official CALL statements.

Researchers recognized Home windows devices that naturally comprise name directions at anticipated places, permitting spoofed frames to seem official.

Module Decision Evasion: Earlier implementations assumed the ultimate caller module would stay unresolvable. Moonwalk++ injects shellcode into official processes corresponding to OneDrive.exe, permitting devices to be sourced from the goal course of’s picture base slightly than system libraries.

The analysis, led by safety skilled Alessandro Magnosi (klezVirus), builds on the foundational Stack Moonwalk method offered at DEFCON 31.

In-Reminiscence Encryption: The method employs customized ROP chains to encrypt and modify the reminiscence protections of shellcode areas post-deployment

 A novel stack construction conceals these encryption routines inside invisible stack frames, sustaining a clear, unwindable name stack regardless of ongoing encryption operations.

Detection Failure

Testing towards common safety instruments yielded regarding outcomes. Hunt-Sleeping-Beacons, Get-InjectedThreadEx, and even the Eclipse detection algorithm didn’t establish Moonwalk++ exercise.

Whereas hollows_hunter may detect encrypted artifacts by way of obfuscation evaluation, name stack inspection strategies proved ineffective.

The analysis highlights a elementary weak point in stack-based detection: it depends on assumptions about official execution patterns and reminiscence traits. When these assumptions fail, detection mechanisms develop into bypassed.

Evasion Analysis

The whole code is obtainable on GitHub as “Moonwalk–” (hyphens used because of platform restrictions), alongside complete technical documentation.

Researchers emphasize that this work demonstrates the depth of name stack evasion capabilities when strategies are absolutely optimized, difficult present assumptions underlying fashionable endpoint detection methods.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Call, ElasticInspired, Evade, Malware, Moonwalk, PoC, Rules, Shows, Spoof, Stacks, Windows

Post navigation

Previous Post: See Threats to Your Industry & Country in Real Time
Next Post: CISA Adds Fortinet Vulnerability to KEV Catalog After Active Exploitation

Related Posts

SmartApeSG Campaign Exploits ClickFix for Malware Spread SmartApeSG Campaign Exploits ClickFix for Malware Spread Cyber Security News
1.5 Billion Packets Per Second DDoS Attack Detected with FastNetMon 1.5 Billion Packets Per Second DDoS Attack Detected with FastNetMon Cyber Security News
FortiWeb Authentication Bypass Vulnerability Let Attackers Log in As Any Existing User FortiWeb Authentication Bypass Vulnerability Let Attackers Log in As Any Existing User Cyber Security News
Hackers Started Exploiting CitrixBleed 2 Vulnerability Before Public PoC Disclosure Hackers Started Exploiting CitrixBleed 2 Vulnerability Before Public PoC Disclosure Cyber Security News
VVS Stealer Uses PyArmor Obfuscation to Evade Static Analysis and Signature Detection VVS Stealer Uses PyArmor Obfuscation to Evade Static Analysis and Signature Detection Cyber Security News
Over 644,000 Domains Exposed to Critical React Server Components Vulnerability Over 644,000 Domains Exposed to Critical React Server Components Vulnerability Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark