Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
DinDoor Backdoor Exploits Deno and MSI for Stealth Attacks

DinDoor Backdoor Exploits Deno and MSI for Stealth Attacks

Posted on April 22, 2026 By CWS

A newly discovered backdoor, known as DinDoor, has been identified utilizing the legitimate Deno JavaScript runtime alongside MSI installer files to evade detection and infiltrate targeted systems. This sophisticated malware, a variant of the Tsundere Botnet, employs signed runtime environments rather than traditional compiled implants, complicating detection processes in networks where Deno is either allowlisted or not closely monitored.

How DinDoor Infiltrates Systems

DinDoor is primarily distributed via phishing emails or malicious drive-by downloads masquerading as MSI files. Upon execution, these files download the Deno runtime from its official endpoint, dl.deno[.]land, circumventing the need for administrative privileges. Subsequently, the malware executes obfuscated JavaScript to gather system information, establish contact with its command-and-control (C2) infrastructure, and download further payloads.

Research conducted by Hunt.io, which analyzed samples uploaded to public databases, indicated significant behavioral variances between the DinDoor variants, despite their shared execution model. Their investigation uncovered that a solitary HuntSQL query focused on DinDoor’s HTTP response identified 20 active C2 servers dispersed across 15 autonomous systems at the time of their report.

Connections to Broader Threat Networks

Further analysis linked DinDoor’s activities to the Iranian APT group Seedworm, also recognized as MuddyWater, which has a history of targeting U.S. organizations. The malware’s association with a larger threat framework is alarming, with the C2 domain serialmenot[.]com being used by various ransomware operators and state-sponsored entities. Research from JUMPSEC correlated this domain with TAG-150, a group deploying it as a backend for a malware family named CastleLoader, with which DinDoor exhibits behavioral similarities.

Understanding DinDoor’s execution chain reveals its deliberate design to evade detection. One sample, migcredit.pdf.msi, uses msiexec.exe to drop a PowerShell script, launching it with hidden window flags and bypassing execution policy enforcement. The script checks for the presence of deno.exe, installing it if necessary, and decodes a base64-encoded JavaScript payload for execution.

Security Recommendations and Future Outlook

Security professionals are advised to consider any unexpected execution of deno.exe as a child of powershell.exe or wscript.exe as a high-priority alert. Organizations should restrict MSI execution using AppLocker or Windows Defender Application Control to mitigate DinDoor’s primary delivery vector. Monitoring command-line patterns like deno.exe -A data:application/javascript;base64 and TCP binds on specific localhost ports can aid in detecting infections.

To bolster defenses, network defenders should review HTTP logs for specific headers and consider blocking known malicious domains and communications with unreliable hosting providers. As the cybersecurity landscape evolves, staying vigilant and implementing proactive measures is crucial in safeguarding against emerging threats like DinDoor.

Cyber Security News Tags:APT group, Cybersecurity, Deno runtime, DinDoor backdoor, malware analysis, MSI installers, MuddyWater, network security, Phishing, Tsundere Botnet

Post navigation

Previous Post: UK Faces Rising Cyber Threats from Russia, Iran, China
Next Post: Venezuelan Energy Sector Hit by New Wiper Malware

Related Posts

Hackers Weaponize Compiled HTML Help to Deliver Malicious Payload Hackers Weaponize Compiled HTML Help to Deliver Malicious Payload Cyber Security News
Synology BeeStation 0-Day Vulnerability Let Remote Attackers Execute Arbitrary Code Synology BeeStation 0-Day Vulnerability Let Remote Attackers Execute Arbitrary Code Cyber Security News
CISOs Role in Driving Secure Digital Transformation CISOs Role in Driving Secure Digital Transformation Cyber Security News
Chrome 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code Chrome 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code Cyber Security News
New Spear-Phishing Attack Targeting Security Individuals in Israel Region New Spear-Phishing Attack Targeting Security Individuals in Israel Region Cyber Security News
TeamPCP’s Cloud Exploitation Transforms Cybercrime TeamPCP’s Cloud Exploitation Transforms Cybercrime Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Claude Mythos AI Uncovers Numerous Firefox Vulnerabilities
  • Rise in Supply Chain Attacks Highlights SBOM Challenges
  • Linux GoGra Backdoor Targets South Asia via Microsoft API
  • Mastodon Faces Major DDoS Attack Following Bluesky Incident
  • Venezuelan Energy Sector Hit by New Wiper Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Claude Mythos AI Uncovers Numerous Firefox Vulnerabilities
  • Rise in Supply Chain Attacks Highlights SBOM Challenges
  • Linux GoGra Backdoor Targets South Asia via Microsoft API
  • Mastodon Faces Major DDoS Attack Following Bluesky Incident
  • Venezuelan Energy Sector Hit by New Wiper Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark