Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Infostealer Malware Delivered in EmEditor Supply Chain Attack

Infostealer Malware Delivered in EmEditor Supply Chain Attack

Posted on December 29, 2025December 29, 2025 By CWS

The favored textual content and code modifying software program EmEditor was just lately focused in a provide chain assault that resulted within the distribution of infostealer malware.

Developed by Redmond-based Emurasoft, Inc., EmEditor is a high-performance Home windows software designed for coding, textual content modifying, and processing giant recordsdata.

In a safety incident discover posted on the official web site on December 22, the software program’s builders warned that people who had downloaded EmEditor utilizing the ‘obtain now’ button between December 19, 18:39 PT, and December 22, 12:50 PT, could have been served a malicious installer.

“In case you downloaded the installer from the [Download Now] button on the EmEditor homepage throughout this era, it’s potential {that a} totally different file with out our digital signature was downloaded. This can be a conservative estimate, and in actuality the affected interval could have been narrower and restricted to a particular timeframe,” the discover reads.

Primarily based on Emurasoft’s evaluation, the URL behind the ‘Obtain Now’ button was modified to level to a malicious .msi file hosted in a unique location on the EmEditor web site.

The pretend installer had the identical title and was related in dimension to the real installer, however was signed with a certificates belonging to a unique firm.

When run, the malicious installer executed a PowerShell command designed to obtain and execute a file from a pretend EmEditor area. 

The Chinese language cybersecurity firm Qianxin has investigated the assault and warned enterprises and authorities organizations concerning the potential menace. The safety agency famous that the editor has a major consumer base in China.

Qianxin’s evaluation confirmed that the malicious .msi file contained a script designed to gather system data, together with recordsdata from the Desktop, Paperwork, and Downloads folders. Information corresponding to VPN configurations, browser data, and credentials for Home windows and functions corresponding to Zoho Mail, Discord, Slack, Groups, Zoom, WinSCP, PuTTY, Telegram, and Steam are additionally collected. Commercial. Scroll to proceed studying.

The safety agency identified that the malware checks the system’s language, and it terminates if it’s set to former Soviet nations or Iran. 

Qianxin researchers additionally discovered that when it collects data, the malicious script deploys a browser extension named ‘Google Drive Caching’, which has been described as a fully-featured information-stealing malware.

This malicious extension is used for persistence and allows the attackers to gather system data, browser historical past and bookmarks, and cookies.

As well as, the extension has clipboard hijacking performance that permits it to interchange cryptocurrency addresses with ones owned by the attacker. It’s additionally able to logging keystrokes and stealing Fb advert accounts.

Qianxin has not shared any data on attribution, however its description means that the availability chain assault was performed by profit-driven cybercriminals reasonably than a state-sponsored APT. Nevertheless, the cybersecurity business says the traces between the 2 menace actor classes are more and more blurred. 

Indicators of compromise (IoCs) for the EmEditor assault can be found from Qianxin and Emurasoft.

Associated: 640 NPM Packages Contaminated in New ‘Shai-Hulud’ Provide Chain Assault

Associated: Chinese language Cyberspies Deploy ‘BadAudio’ Malware by way of Provide Chain Assaults

Associated: Provide Chain Assault Targets VS Code Extensions With ‘GlassWorm’ Malware

Security Week News Tags:Attack, Chain, Delivered, EmEditor, InfoStealer, Malware, Supply

Post navigation

Previous Post: Windows LPE Vulnerabilities via Kernel Drivers and Named Pipes Allows Privilege Escalation
Next Post: 22 Million Affected by Aflac Data Breach

Related Posts

Mitel Patches Critical Flaw in Enterprise Communication Platform Mitel Patches Critical Flaw in Enterprise Communication Platform Security Week News
The Congressional Budget Office Was Hacked. It Says It Has Implemented New Security Measures The Congressional Budget Office Was Hacked. It Says It Has Implemented New Security Measures Security Week News
Anne Arundel Dermatology Data Breach Impacts 1.9 Million People Anne Arundel Dermatology Data Breach Impacts 1.9 Million People Security Week News
Novee Emerges From Stealth With .5 Million in Funding Novee Emerges From Stealth With $51.5 Million in Funding Security Week News
Linux Security: New Flaws Allow Root Access, CISA Warns of Old Bug Exploitation Linux Security: New Flaws Allow Root Access, CISA Warns of Old Bug Exploitation Security Week News
Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News