Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
COLDRIVER APT Group Uses ClickFix To Deliver a New PowerShell-Based Backdoor BAITSWITCH

COLDRIVER APT Group Uses ClickFix To Deliver a New PowerShell-Based Backdoor BAITSWITCH

Posted on September 25, 2025September 25, 2025 By CWS

In latest weeks, safety researchers have noticed a surge in focused assaults attributed to the COLDRIVER superior persistent risk (APT) group.

This adversary has launched a brand new PowerShell-based backdoor, dubbed BAITSWITCH, which displays subtle command-and-control methods whereas mixing into authentic Home windows processes.

Preliminary sightings hint again to late July 2025, when intrusion makes an attempt in opposition to authorities non-profits in Southeast Asia started to spike, leveraging spear-phishing emails that carried weaponized Workplace paperwork.

These paperwork, when opened, silently invoked PowerShell scripts that established the foothold for BAITSWITCH. Early indicators recommend that the group refined its social-engineering lures to imitate inside memos, growing click-through charges amongst high-value targets.

Following these preliminary incursions, Zscaler researchers famous that BAITSWITCH diverges from typical script-based loaders by embedding its complete payload inside encoded PowerShell instructions.

Relatively than downloading binaries straight from public repositories, the loader unpacks an encrypted module straight in reminiscence. This method minimizes forensic artifacts on disk, hindering conventional antivirus instruments.

Inside per week of its emergence, Zscaler analysts recognized lateral-movement makes an attempt by BAITSWITCH operators, demonstrating utilization of built-in Home windows utilities comparable to Invoke-Command and Get-Service to enumerate and pivot throughout the community .

By September 2025, incident response groups reported compromised Energetic Listing accounts in a number of organizations, with exfiltration of proprietary paperwork and system snapshots.

Multi-stage end-to-end ClickFix marketing campaign assault chain leveraging BAITSWITCH to ship SIMPLEFIX (Supply – Zscaler)

The affect of BAITSWITCH extends past information theft; its stealthy communication channels have allowed the actor to reside dormant for weeks earlier than executing damaging payloads.

Organizations with incomplete PowerShell logging or missing community egress monitoring have confirmed particularly weak to undetected persistence.

An infection Mechanism

The an infection chain of BAITSWITCH hinges on a multi-stage PowerShell deployment sequence. First, victims obtain a lure doc with macros that execute the next snippet upon consumer interplay:-

$EncPayload = “JHtQcml2YXRlS2V5fQ==”
$Decoded = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($EncPayload))
Invoke-Expression $Decoded

ClickFix social-engineering decoy doc hosted on Google Drive (Supply – Zscaler)

This code decodes a Base64-encoded string containing the next-stage loader. The loader then performs an AES decryption routine utilizing a hard-coded key throughout the script to disclose the ultimate backdoor module:

Operate Decrypt-Module($cipherText,$key){
$AES = [System.Security.Cryptography.Aes]::Create()
$AES.Key = [Convert]::FromBase64String($key)
$AES.Mode=”CBC”
$AES.IV = $AES.Key[0..15]
$decryptor = $AES.CreateDecryptor()
return [System.Text.Encoding]::UTF8.GetString($decryptor.TransformFinalBlock([Convert]::FromBase64String($cipherText),0,$cipherText.Size))
}

Upon decryption, BAITSWITCH registers itself as a scheduled job named “WindowsUpdateSvc” and injects its instructions into the svchost.exe course of to evade detection.

The backdoor communicates with its C2 server over HTTPS, masquerading site visitors as routine Home windows Replace requests. This an infection mechanism underscores COLDRIVER’s emphasis on script-only payloads and operational safety, complicating each detection and remediation efforts.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:APT, Backdoor, BAITSWITCH, ClickFix, COLDRIVER, Deliver, Group, PowerShellBased

Post navigation

Previous Post: Chinese Spies Lurked in Networks for 393 Days, Hunted for Zero-Day Intel
Next Post: Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More

Related Posts

Real-Time Threat Intelligence for Proactive Cyber Defense in 2025 Real-Time Threat Intelligence for Proactive Cyber Defense in 2025 Cyber Security News
Ransomware Disrupts BridgePay’s Nationwide Payment Processing Ransomware Disrupts BridgePay’s Nationwide Payment Processing Cyber Security News
Salty2FA and Tycoon2FA Phishing Kits Attacking Enterprise Users to Steal Login Credentials Salty2FA and Tycoon2FA Phishing Kits Attacking Enterprise Users to Steal Login Credentials Cyber Security News
New Trends in Phishing Attacks Emerges as AI Reshaping the Tool used by Cybercriminals New Trends in Phishing Attacks Emerges as AI Reshaping the Tool used by Cybercriminals Cyber Security News
Hackers Leverage Built-in MacOS Protection Features to Deploy Malware Hackers Leverage Built-in MacOS Protection Features to Deploy Malware Cyber Security News
Princeton University Data Breach – Database with Donor Info Compromised Princeton University Data Breach – Database with Donor Info Compromised Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News