Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Moonwalk++ PoC Shows How Malware Can Spoof Windows Call Stacks and Evade Elastic-Inspired Rules

Posted on December 17, 2025December 17, 2025 By CWS

A complicated proof-of-concept demonstrating how malware can bypass superior name stack detection mechanisms more and more adopted by enterprise safety distributors like Elastic.

The brand new Moonwalk++ method extends prior stack-spoofing analysis and divulges vital gaps in present endpoint detection methods.

 possible reminiscence location

The Evasion Problem

As defenders more and more depend on name stack telemetry to establish malicious exercise, attackers are creating extra superior countermeasures.

Introduces strategies to spoof name stacks whereas concurrently encrypting malware in reminiscence capabilities beforehand thought of infeasible.

Elastic Safety Labs lately printed detection logic designed to establish anomalous name stacks by analyzing execution patterns, caller identification, and reminiscence traits.

Spoof goal operate

Moonwalk++ circumvents these protections by way of a number of evasion vectors. The PoC demonstrates three vital bypasses:

Name Instruction Validation Bypass: Detection programs test whether or not directions previous return addresses are official CALL statements.

Researchers recognized Home windows devices that naturally comprise name directions at anticipated places, permitting spoofed frames to seem official.

Module Decision Evasion: Earlier implementations assumed the ultimate caller module would stay unresolvable. Moonwalk++ injects shellcode into official processes corresponding to OneDrive.exe, permitting devices to be sourced from the goal course of’s picture base slightly than system libraries.

The analysis, led by safety skilled Alessandro Magnosi (klezVirus), builds on the foundational Stack Moonwalk method offered at DEFCON 31.

In-Reminiscence Encryption: The method employs customized ROP chains to encrypt and modify the reminiscence protections of shellcode areas post-deployment

 A novel stack construction conceals these encryption routines inside invisible stack frames, sustaining a clear, unwindable name stack regardless of ongoing encryption operations.

Detection Failure

Testing towards common safety instruments yielded regarding outcomes. Hunt-Sleeping-Beacons, Get-InjectedThreadEx, and even the Eclipse detection algorithm didn’t establish Moonwalk++ exercise.

Whereas hollows_hunter may detect encrypted artifacts by way of obfuscation evaluation, name stack inspection strategies proved ineffective.

The analysis highlights a elementary weak point in stack-based detection: it depends on assumptions about official execution patterns and reminiscence traits. When these assumptions fail, detection mechanisms develop into bypassed.

Evasion Analysis

The whole code is obtainable on GitHub as “Moonwalk–” (hyphens used because of platform restrictions), alongside complete technical documentation.

Researchers emphasize that this work demonstrates the depth of name stack evasion capabilities when strategies are absolutely optimized, difficult present assumptions underlying fashionable endpoint detection methods.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Call, ElasticInspired, Evade, Malware, Moonwalk, PoC, Rules, Shows, Spoof, Stacks, Windows

Post navigation

Previous Post: See Threats to Your Industry & Country in Real Time
Next Post: CISA Adds Fortinet Vulnerability to KEV Catalog After Active Exploitation

Related Posts

New Gmail Phishing Attack Uses AI Prompt Injection to Evade Detection Cyber Security News
CISA Releases Four ICS Advisories Surrounding Vulnerabilities, and Exploits Cyber Security News
New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers Cyber Security News
71,000+ WatchGuard Devices Vulnerable to Remote Code Execution Attacks Cyber Security News
Microsoft Confirms Windows 11 24H2 Update Broken Multiple Core Features Cyber Security News
20 Best Network Monitoring Tools in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Weaponize SVG Files and Office Documents to Target Windows Users
  • Microsoft Teams Down – Users Face Messaging Delays and Service Disruptions Worldwide
  • Thailand Conference Launches International Initiative to Fight Online Scams
  • 25,000+ FortiCloud SSO-Enabled Devices Exposed to Remote Attacks
  • Criminal IP and Palo Alto Networks Cortex XSOAR Integrate to Deliver AI-Driven Exposure Intelligence

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Weaponize SVG Files and Office Documents to Target Windows Users
  • Microsoft Teams Down – Users Face Messaging Delays and Service Disruptions Worldwide
  • Thailand Conference Launches International Initiative to Fight Online Scams
  • 25,000+ FortiCloud SSO-Enabled Devices Exposed to Remote Attacks
  • Criminal IP and Palo Alto Networks Cortex XSOAR Integrate to Deliver AI-Driven Exposure Intelligence

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark