Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Threat Actors Weaponizes LNK File to Deploy MoonPeak Malware Attacking Windows Systems

Threat Actors Weaponizes LNK File to Deploy MoonPeak Malware Attacking Windows Systems

Posted on January 23, 2026January 23, 2026 By CWS

A brand new malware marketing campaign focusing on Home windows customers has emerged, utilizing misleading LNK shortcut information to distribute MoonPeak, a harmful distant entry trojan.

This malware, which seems to be a variant of XenoRAT, has been linked to risk actors affiliated with North Korea.

The assault primarily targets South Korean traders and cryptocurrency merchants via weaponized information disguised as respectable PDF paperwork associated to buying and selling methods.

When victims open the malicious LNK file, it triggers a classy an infection chain that deploys the malware whereas displaying a decoy PDF to keep away from suspicion.

The marketing campaign was first detected in January 2026, with LNK information containing Korean filenames suggesting investment-related content material.

These information embed an XOR-encoded PDF that opens usually when clicked, making the assault seem innocent to unsuspecting customers.

Behind the scenes, nevertheless, an obfuscated PowerShell script executes silently in a hidden window.

This script initiates a number of phases of payload supply, establishing persistence on the contaminated system and speaking with distant servers managed by the attackers.

IIJ Safety Diary analysts recognized this risk via detailed malware evaluation, uncovering the whole an infection stream that had not been totally documented in earlier studies.

Malicious PowerShell script created within the short-term folder (Supply – IIJ Safety Diary)

The researchers traced the assault infrastructure to GitHub repositories used for internet hosting malicious payloads, demonstrating the risk actors’ use of respectable platforms to evade detection.

Malicious VBScript created within the short-term folder (Supply – IIJ Safety Diary)

This system, referred to as Residing Off Trusted Websites (LOTS), permits attackers to bypass safety measures that sometimes block suspicious domains.

Multi-Stage An infection Mechanism and Evasion Techniques

The MoonPeak an infection course of operates via three distinct phases, every designed to evade safety evaluation and set up persistent entry.

Within the first stage, the LNK file checks for safety instruments and digital environments by scanning for particular working processes akin to IDA Professional, Wireshark, OllyDbg, and numerous sandbox indicators.

If any evaluation instruments are detected, the script instantly terminates to forestall researchers from finding out its conduct. This anti-analysis approach ensures the malware solely executes on real sufferer techniques.

As soon as the surroundings verify passes, the PowerShell script creates randomly named folders and information within the short-term listing, downloading further scripts from distant servers.

The duty that might be created for computerized execution (Supply – IIJ Safety Diary)

A scheduled process is then created to make sure the malware runs routinely, even after system reboots.

The second stage entails retrieving a GZIP-compressed payload from a GitHub repository, which is decompressed and loaded instantly into reminiscence with out touching the disk.

Malicious GitHub repository created by a risk actor (Supply – IIJ Safety Diary)

The ultimate stage deploys MoonPeak itself, obfuscated utilizing ConfuserEx to withstand decompilation and evaluation. The malware connects to its command-and-control server at 27.102.137[.]88:443, enabling attackers to remotely management contaminated machines.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Actors, Attacking, Deploy, File, LNK, Malware, MoonPeak, Systems, Threat, Weaponizes, Windows

Post navigation

Previous Post: Fake Captcha Ecosystem Exploits Trusted Web Infrastructure to Deliver Malware
Next Post: 20,000 WordPress Sites Affected by Backdoor Vulnerability Allowing Malicious Admin User Creation

Related Posts

Proxyware Malware Disguised as Notepad++ Tool Leverages Windows Explorer Process to Hijack Systems Proxyware Malware Disguised as Notepad++ Tool Leverages Windows Explorer Process to Hijack Systems Cyber Security News
Ubiquiti UniFi Door Access App Vulnerability Exposes API Management Without Authentication Ubiquiti UniFi Door Access App Vulnerability Exposes API Management Without Authentication Cyber Security News
NailaoLocker Ransomware Attacking Windows Systems Using Chinese SM2 Cryptographic Standard NailaoLocker Ransomware Attacking Windows Systems Using Chinese SM2 Cryptographic Standard Cyber Security News
Top 10 Best Brand Protection Solutions For Enterprises in 2025 Top 10 Best Brand Protection Solutions For Enterprises in 2025 Cyber Security News
Jenkins Gatling Plugin Vulnerability Let Attackers Bypass Content-Security-Policy Protection Jenkins Gatling Plugin Vulnerability Let Attackers Bypass Content-Security-Policy Protection Cyber Security News
Researchers Manipulate Stolen Data to Corrupt AI Models and Generate Inaccurate Outputs Researchers Manipulate Stolen Data to Corrupt AI Models and Generate Inaccurate Outputs Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News