Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Multi-Stage Windows Malware Disables Microsoft Defender Before Dropping Malicious Payloads

New Multi-Stage Windows Malware Disables Microsoft Defender Before Dropping Malicious Payloads

Posted on January 22, 2026January 22, 2026 By CWS

Safety researchers have recognized a classy multi-stage malware marketing campaign focusing on Home windows techniques by means of social engineering and weaponized cloud providers.

The assault employs business-themed paperwork as misleading entry factors, luring customers into extracting compressed archives containing malicious shortcuts that execute PowerShell instructions within the background.

As soon as initiated, the an infection chain systematically neutralizes Microsoft Defender earlier than delivering harmful payloads together with ransomware, surveillance instruments, and banking trojans.

The marketing campaign represents a regarding evolution in assault sophistication, as risk actors keep away from exploiting software program vulnerabilities totally.

As a substitute, the assault depends on abuse of respectable working system performance, native administrative instruments, and public cloud platforms resembling GitHub and Dropbox to stay hidden inside regular enterprise site visitors patterns.

This strategy dramatically reduces the chance of signature-based detection whereas amplifying impression by means of sustained, multi-layered compromise.

The an infection begins with a misleading LNK shortcut file disguised as a normal accounting doc. When executed, this file launches PowerShell utilizing an execution coverage bypass, downloading an obfuscated first-stage loader script from GitHub.

Assault chain (Supply – Fortinet)

The loader establishes persistence, generates decoy paperwork to distract customers, and initiates communication with the attacker by way of the Telegram Bot API to verify profitable compromise.

Fortinet analysts recognized the malware after discovering the subtle defense-evasion mechanisms embedded all through the assault chain.

A vital part of this marketing campaign is the operational abuse of Defendnot, a analysis software initially designed to display Home windows Safety Middle vulnerabilities.

An infection Vector

Risk actors repurposed this software to systematically disable Microsoft Defender by registering a pretend antivirus product, exploiting Home windows belief assumptions to pressure Defender’s computerized shutdown.

Telegram notification and secondary script deployment (Supply – Fortinet)

The assault progresses by means of 4 distinct operational phases. Following defensive neutralization, the marketing campaign transitions into surroundings reconnaissance and energetic surveillance, deploying screenshot seize modules that exfiltrate visible proof of consumer exercise.

The attacker then implements complete system lockdown, disabling administrative instruments, destroying restoration mechanisms, and hijacking file associations to forestall victims from executing respectable purposes or accessing their very own recordsdata.

Administrative privilege verification and UAC escalation logic (Supply – Fortinet)

Lastly, the marketing campaign deploys Amnesia RAT for persistent distant entry and knowledge theft, focusing on browser credentials, cryptocurrency wallets, and delicate monetary data.

WinLocker interface imposing system lockout (Supply – Fortinet)

Parallel deployment of Hakuna Matata ransomware encrypts consumer recordsdata with the extension NeverMind12F whereas WinLocker elements implement full system lockout, displaying countdown timers that stress victims into contacting the attacker for ransom negotiation.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Defender, Disables, Dropping, Malicious, Malware, Microsoft, MultiStage, Payloads, Windows

Post navigation

Previous Post: BIND 9 Vulnerability Allow Attackers to Crash Server by Sending Malicious Records
Next Post: Furl Raises $10 Million for Autonomous Vulnerability Remediation

Related Posts

Hackers Can Use GenAI to Change Loaded Clean Page Into Malicious within Seconds Hackers Can Use GenAI to Change Loaded Clean Page Into Malicious within Seconds Cyber Security News
Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer Cyber Security News
Lumma Stealer Via Fake Cracked Software Steals Login Credentials and Private Files Lumma Stealer Via Fake Cracked Software Steals Login Credentials and Private Files Cyber Security News
Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers Cyber Security News
Hackers Leverages Microsoft Entra Tenant Invitations to Launch TOAD Attacks Hackers Leverages Microsoft Entra Tenant Invitations to Launch TOAD Attacks Cyber Security News
Threat Actors Exploitation Attempts Spikes as an Early Indicator of New Cyber Vulnerabilities Threat Actors Exploitation Attempts Spikes as an Early Indicator of New Cyber Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News