Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Beware of Fake Leonardo DiCaprio Movie Torrent File Drops Agent Tesla Malware

Posted on December 12, 2025December 12, 2025 By CWS

A brand new menace is concentrating on film lovers who seek for the newest movies on-line. Cybercriminals at the moment are utilizing the recognition of Leonardo DiCaprio’s new movie, One Battle After One other, to unfold the harmful Agent Tesla malware.

What seems to be a easy film obtain truly incorporates a sequence of hidden PowerShell scripts that set up a Distant Entry Trojan on Home windows computer systems.

This malware provides attackers full management over contaminated gadgets, permitting them to steal private and monetary info.

The pretend film torrent has already reached hundreds of customers. When somebody downloads what seems just like the movie, they obtain a folder containing a number of recordsdata that appear regular.

Nevertheless, clicking on a shortcut file named CD.lnk begins a fancy assault course of that runs totally within the background with out the person figuring out.

The malware makes use of authentic Home windows instruments like CMD, PowerShell, and Process Scheduler to cover its actions and keep away from detection by safety software program.

Bitdefender safety researchers recognized this menace after noticing an uncommon enhance in detections associated to the film torrent.

Their investigation revealed a rigorously designed assault methodology that makes use of a number of layers of encryption and scripts hidden inside what look like regular subtitle and picture recordsdata.

All the course of runs in reminiscence, that means no suspicious recordsdata are written to the arduous drive, making it extraordinarily troublesome for conventional safety instruments to catch.

The an infection begins when customers open the CD.lnk file, which they assume will play the film. As an alternative, this file runs a hidden command that reads particular traces from a subtitle file referred to as Part2.subtitles.srt.

These traces include batch code that launches PowerShell scripts. The intelligent half is that the subtitle file truly incorporates actual film subtitles, however traces 100 to 103 disguise the malicious code that begins every part.

How the Assault Unfolds By A number of Phases

The PowerShell instructions extract and decode encrypted knowledge from the identical subtitle file. Utilizing AES encryption methods, the malware creates 5 separate PowerShell scripts in a hidden folder at C:CustomersAppDataLocalMicrosoftDiagnostics.

Hidden code inside subtitles (Supply – Bitdefender)

Every script has a selected job within the assault chain. The primary script extracts content material from a pretend video file named One Battle After One other.m2ts, which is definitely a disguised archive.

The script checks for frequent extraction instruments like WinRAR, 7-Zip, or Bandizip and makes use of whichever one it finds. One other script creates a scheduled process referred to as RealtekDiagnostics that pretends to be an audio helper program.

Decrypting embedded payloads (Supply – Bitdefender)

This ensures the malware runs mechanically each time the pc begins or when a person logs in. The duty stays hidden and makes use of regular Home windows processes to keep away from suspicion.

In the meantime, different scripts decode hidden knowledge from pretend picture recordsdata named Picture.jpg and Cowl.jpg, which truly include binary knowledge and extra archives protected by easy passwords.

The ultimate stage compiles and runs the Agent Tesla payload straight in reminiscence. This Distant Entry Trojan establishes a reference to attacker-controlled servers, turning the contaminated pc right into a zombie machine that can be utilized for stealing credentials, launching extra assaults, or deploying extra malware.

All the operation demonstrates how attackers use multi-stage scripting and fileless execution to bypass safety measures and keep long-term entry to sufferer techniques.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Agent, Beware, DiCaprio, Drops, Fake, File, Leonardo, Malware, Movie, Tesla, Torrent

Post navigation

Previous Post: Ashen Lepus Hacker Group Attacks Eastern Diplomatic Entities With New AshTag Malware
Next Post: Policy, Isolation, and Data Controls That Actually Work

Related Posts

“AI-Induced Destruction” – Helpful Tools Become Accidental Weapons Cyber Security News
New Ghost-tapping Attacks Steal Customers’ Cards Linked to Services Like Apple Pay and Google Pay Cyber Security News
11 Best SysAdmin Tools – 2025 Cyber Security News
Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools Cyber Security News
BlockBlasters Steam Game Downloads Malware to Computer Disguised as Patch Cyber Security News
Sophisticated Malware Campaign Targets WordPress and WooCommerce Sites with Obfuscated Skimmers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: PromptPwnd Attack, Small macOS Bounties, Chinese Hackers Trained in Cisco Academy
  • New Research Details on What Happens to Data Stolen in a Phishing Attack
  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
  • New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users
  • Gladinet CentreStack Flaw Exploited to Hack Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: PromptPwnd Attack, Small macOS Bounties, Chinese Hackers Trained in Cisco Academy
  • New Research Details on What Happens to Data Stolen in a Phishing Attack
  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
  • New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users
  • Gladinet CentreStack Flaw Exploited to Hack Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark