Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Proxyware Malware Disguised as Notepad++ Tool Leverages Windows Explorer Process to Hijack Systems

Posted on January 22, 2026January 22, 2026 By CWS

A complicated malware marketing campaign focusing on unsuspecting customers has emerged, disguising malicious proxyware as respectable Notepad++ installations.

This assault, orchestrated by the menace actor Larva-25012, exploits customers in search of cracked software program by misleading commercial pages and pretend obtain portals.

The malware hijacks victims’ web bandwidth with out consent, permitting attackers to revenue by sharing community sources with exterior events.

This methodology, often called proxyjacking, mirrors cryptojacking however monetizes community bandwidth as a substitute of computing energy.

The menace has primarily affected techniques in South Korea, the place distribution happens by web sites posing as obtain portals for pirated software program.

Malware obtain portal (Supply – ASEC)

The malicious information are hosted on GitHub repositories and delivered as both MSI installers or ZIP archives containing each respectable Notepad++ elements and hidden malware.

As soon as executed, the malware establishes persistence by Home windows Activity Scheduler entries and deploys proxyware packages together with Infatica and DigitalPulse.

These packages function silently within the background, redirecting victims’ bandwidth to generate income for attackers.

ASEC analysts recognized this marketing campaign and famous the attacker’s evolving ways to keep away from detection. The menace actor has shifted from .NET-based malware to C++ and Python variants, using superior injection strategies that concentrate on the Home windows Explorer course of.

This development demonstrates the attacker’s willpower to bypass safety options and preserve management over compromised techniques.

The an infection chain begins when customers obtain what seems to be a Notepad++ installer from fraudulent web sites.

Nonetheless, the downloaded bundle comprises malicious DLL information that execute by DLL side-loading strategies.

The malware then injects shellcode into respectable Home windows processes, deploys PowerShell scripts to put in extra elements like NodeJS or Python, and creates a number of obfuscated loader information.

These loaders talk with command-and-control servers, retrieve directions, and set up proxyware modules that exploit victims’ community connections.

An infection Mechanism and Persistence Technique

The malware employs two main distribution variants: Setup.msi and Setup.zip. The MSI variant installs a C++-based DLL that registers itself in Home windows Activity Scheduler below the title “Notepad Replace Scheduler” and launches by way of Rundll32.exe.

Activity Scheduler entry answerable for executing the put in malicious DLL (Supply – ASEC)

This DLL injects shellcode into AggregatorHost.exe, which generates a PowerShell script that installs NodeJS and creates obfuscated JavaScript malware information often called DPLoader.

To take care of stealth, the script modifies Home windows Defender insurance policies by including exclusion paths, disabling safety notifications, and stopping malware pattern submissions.

JavaScript‑primarily based malware (DPLoader) registered within the Activity Scheduler (Supply – ASEC)

The ZIP variant comprises each Setup.exe and a malicious loader named TextShaping.dll. When customers launch the installer, DLL side-loading routinely executes the malware.

Malware inside Setup.zip (Supply – ASEC)

TextShaping.dll decrypts embedded shellcode that deploys a dropper instantly in reminiscence. This dropper installs Python from official sources, creates a Python-based DPLoader variant, and registers a VBS launcher in Activity Scheduler to make sure persistent execution.

Loader malware and decrypted dropper (Supply – ASEC)

The malware in the end injects the ultimate payload into explorer.exe, the place DigitalPulse proxyware runs as an obfuscated Go-based program.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Disguised, Explorer, Hijack, Leverages, Malware, Notepad, Process, Proxyware, Systems, Tool, Windows

Post navigation

Previous Post: New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack
Next Post: Hackers Hijacking Snap Domains to Posion Linux Software Packages for Desktops and Servers

Related Posts

Palo Alto Networks GlobalProtect Vulnerability Allows Root User Privilege Escalation Cyber Security News
EDR-Freeze Tool Technical Workings Along With Forensic Artifacts Revealed Cyber Security News
Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results Cyber Security News
Beware of Weaponized MSI Installer Mimic as WhatsApp Delivers Modified XWorm RAT Cyber Security News
IRGC Hacker Groups Attacking Targeted Financial, Government, and Media Organizations Cyber Security News
Kimsuky APT Hackers Weaponizing LNK Files to Deploy Reflective Malware Bypassing Windows Defender Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
  • New Osiris Ransomware Using Wide Range of Living off the Land and Dual-use Tools in Attacks
  • Beware of PNB MetLife Payment Gateway that Steals Your Details and Direct to UPI Payments
  • Hackers Hijacking Snap Domains to Posion Linux Software Packages for Desktops and Servers
  • Proxyware Malware Disguised as Notepad++ Tool Leverages Windows Explorer Process to Hijack Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
  • New Osiris Ransomware Using Wide Range of Living off the Land and Dual-use Tools in Attacks
  • Beware of PNB MetLife Payment Gateway that Steals Your Details and Direct to UPI Payments
  • Hackers Hijacking Snap Domains to Posion Linux Software Packages for Desktops and Servers
  • Proxyware Malware Disguised as Notepad++ Tool Leverages Windows Explorer Process to Hijack Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark