Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Multi-Stage Windows Malware Disables Microsoft Defender Before Dropping Malicious Payloads

Posted on January 22, 2026January 22, 2026 By CWS

Safety researchers have recognized a classy multi-stage malware marketing campaign focusing on Home windows techniques by means of social engineering and weaponized cloud providers.

The assault employs business-themed paperwork as misleading entry factors, luring customers into extracting compressed archives containing malicious shortcuts that execute PowerShell instructions within the background.

As soon as initiated, the an infection chain systematically neutralizes Microsoft Defender earlier than delivering harmful payloads together with ransomware, surveillance instruments, and banking trojans.

The marketing campaign represents a regarding evolution in assault sophistication, as risk actors keep away from exploiting software program vulnerabilities totally.

As a substitute, the assault depends on abuse of respectable working system performance, native administrative instruments, and public cloud platforms resembling GitHub and Dropbox to stay hidden inside regular enterprise site visitors patterns.

This strategy dramatically reduces the chance of signature-based detection whereas amplifying impression by means of sustained, multi-layered compromise.

The an infection begins with a misleading LNK shortcut file disguised as a normal accounting doc. When executed, this file launches PowerShell utilizing an execution coverage bypass, downloading an obfuscated first-stage loader script from GitHub.

Assault chain (Supply – Fortinet)

The loader establishes persistence, generates decoy paperwork to distract customers, and initiates communication with the attacker by way of the Telegram Bot API to verify profitable compromise.

Fortinet analysts recognized the malware after discovering the subtle defense-evasion mechanisms embedded all through the assault chain.

A vital part of this marketing campaign is the operational abuse of Defendnot, a analysis software initially designed to display Home windows Safety Middle vulnerabilities.

An infection Vector

Risk actors repurposed this software to systematically disable Microsoft Defender by registering a pretend antivirus product, exploiting Home windows belief assumptions to pressure Defender’s computerized shutdown.

Telegram notification and secondary script deployment (Supply – Fortinet)

The assault progresses by means of 4 distinct operational phases. Following defensive neutralization, the marketing campaign transitions into surroundings reconnaissance and energetic surveillance, deploying screenshot seize modules that exfiltrate visible proof of consumer exercise.

The attacker then implements complete system lockdown, disabling administrative instruments, destroying restoration mechanisms, and hijacking file associations to forestall victims from executing respectable purposes or accessing their very own recordsdata.

Administrative privilege verification and UAC escalation logic (Supply – Fortinet)

Lastly, the marketing campaign deploys Amnesia RAT for persistent distant entry and knowledge theft, focusing on browser credentials, cryptocurrency wallets, and delicate monetary data.

WinLocker interface imposing system lockout (Supply – Fortinet)

Parallel deployment of Hakuna Matata ransomware encrypts consumer recordsdata with the extension NeverMind12F whereas WinLocker elements implement full system lockout, displaying countdown timers that stress victims into contacting the attacker for ransom negotiation.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Defender, Disables, Dropping, Malicious, Malware, Microsoft, MultiStage, Payloads, Windows

Post navigation

Previous Post: BIND 9 Vulnerability Allow Attackers to Crash Server by Sending Malicious Records
Next Post: Furl Raises $10 Million for Autonomous Vulnerability Remediation

Related Posts

Hackers use Fake Cloudflare Verification Screen to Trick Users into Executing Malware Cyber Security News
Secret Blizzard Group’s ApolloShadow Malware Install Root Certificates on Devices to Trust Malicious Sites Cyber Security News
Critical Sophos Firewall Vulnerabilities Enables pre-auth Remote Code Execution Cyber Security News
Hackers Leverage GitHub Notifications to Mimic as Y Combinator to Steal Funds from Wallets Cyber Security News
New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users Cyber Security News
Hackers Can Bypass EDR by Downloading Malicious File as In-Memory PE Loader Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Infotainment, EV Charger Exploits Earn Hackers $1M at Pwn2Own Automotive 2026
  • New Windows Notepad and Paint Update Brings More Useful AI Features
  • Fresh SmarterMail Flaw Exploited for Admin Access
  • 2 Venezuelans Convicted in US for Using Malware to Hack ATMs
  • North Korean Hackers Adopted AI to Generate Malware Attacking Developers and Engineering Teams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Infotainment, EV Charger Exploits Earn Hackers $1M at Pwn2Own Automotive 2026
  • New Windows Notepad and Paint Update Brings More Useful AI Features
  • Fresh SmarterMail Flaw Exploited for Admin Access
  • 2 Venezuelans Convicted in US for Using Malware to Hack ATMs
  • North Korean Hackers Adopted AI to Generate Malware Attacking Developers and Engineering Teams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark