Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Silent Watcher Attacking Windows Systems and Exfiltrate Data Using Discord Webhook

Posted on August 11, 2025August 12, 2025 By CWS

A classy Visible Fundamental Script (VBS) malware dubbed “Silent Watcher” has emerged as a persistent risk focusing on Home windows techniques, demonstrating superior knowledge exfiltration capabilities via Discord webhooks.

This stealer, a part of the Cmimai malware household, represents a regarding evolution in information-stealing ways that leverage respectable communication platforms to bypass conventional safety measures.

The malware operates via a rigorously orchestrated multi-stage assault course of, starting with the execution of a VBS script that instantly establishes persistence on contaminated techniques.

Upon initialization, Silent Watcher systematically gathers complete system data via Home windows Administration Instrumentation (WMI) queries, accumulating particulars in regards to the working system, consumer credentials, and laptop specs.

System Data Assortment (Supply – K7 Safety Labs)

K7 Safety Labs researchers recognized this specific pressure via its distinctive operational signature and distinctive webhook communication patterns.

What makes Silent Watcher significantly harmful is its skill to stay undetected whereas constantly monitoring sufferer techniques.

The malware creates a number of PowerShell scripts dynamically, together with “vbs_ps_browser.ps1” for browser metadata extraction and “vbs_ps_diag.ps1” for screenshot seize performance.

Operational Workflow (Supply – K7 Safety Labs)

These scripts are designed to avoid PowerShell execution insurance policies and function with minimal system affect.

The stealer’s exfiltration mechanism demonstrates refined technical implementation, using each WinHttp.WinHttpRequest.5.1 and MSXML2.ServerXMLHTTP objects as fallback mechanisms.

This redundancy ensures dependable knowledge transmission even in restricted community environments.

The malware codecs stolen knowledge as JSON payloads earlier than transmitting to Discord webhooks, making the visitors seem as respectable communication.

Superior Persistence and Evasion Mechanisms

Silent Watcher employs a very crafty persistence technique via timed execution cycles.

After finishing its preliminary knowledge assortment part, the malware enters an infinite loop with exactly calculated one-hour intervals, as demonstrated within the code:-

Dim oneHourMs: oneHourMs = 3600000
Do
LogAction “Sleeping for 1 hour..”
WScript.Sleep oneHourMs
LogAction “Hourly interval: Making an attempt diagnostic report…”
Name AttemptDiagnosticReportViaPS()
Loop

This timing mechanism permits the malware to constantly seize up to date screenshots and system states with out triggering instant suspicion.

The stealer creates short-term recordsdata with randomized names within the system’s short-term folder, systematically cleansing up after every operation to attenuate forensic traces.

vbs_reporter_log.txt (Supply – K7 Safety Labs)

All actions are meticulously logged in “vbs_reporter_log.txt”, offering attackers with detailed operational suggestions whereas sustaining operational safety via automated file cleanup procedures.

Equip your SOC with full entry to the newest risk knowledge from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Attacking, Data, Discord, Exfiltrate, Silent, Systems, Watcher, Webhook, Windows

Post navigation

Previous Post: CastleLoader Malware Infected Over 400+ Devices Using Cloudflare-Themed ClickFix Phishing Attack
Next Post: Meta’s New Feature Transforms Instagram to a New Real-Time Location Broadcaster

Related Posts

PoC Exploit Released for Fortinet 0-Day Vulnerability that Allows Remote Code Execution Cyber Security News
Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code Cyber Security News
Apache HTTP Server 2.4.64 Released With Patch for 8 Vulnerabilities Cyber Security News
Threat Actors Weaponize Smart Contracts to Drain User Crypto Wallets of More Than $900k Cyber Security News
Microsoft 365 Direct Send Weaponized to Bypass Email Security Defenses Cyber Security News
How to Detect and Mitigate Insider Threats in Your Organization Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 1Kosmos Raises $57 Million for Identity Verification and Authentication Platform
  • SAP Patches Critical S/4HANA Vulnerability
  • Critical Vulnerability in Carmaker Portal Let Hackers Unlock the Car Remotely
  • Reddit to Block Internet Archive as AI Companies Have Scraped Data From Wayback Machine
  • OT Networks Targeted in Widespread Exploitation of Erlang/OTP Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 1Kosmos Raises $57 Million for Identity Verification and Authentication Platform
  • SAP Patches Critical S/4HANA Vulnerability
  • Critical Vulnerability in Carmaker Portal Let Hackers Unlock the Car Remotely
  • Reddit to Block Internet Archive as AI Companies Have Scraped Data From Wayback Machine
  • OT Networks Targeted in Widespread Exploitation of Erlang/OTP Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News