Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Silent Watcher Attacking Windows Systems and Exfiltrate Data Using Discord Webhook

Posted on August 11, 2025August 12, 2025 By CWS

A classy Visible Fundamental Script (VBS) malware dubbed “Silent Watcher” has emerged as a persistent risk focusing on Home windows techniques, demonstrating superior knowledge exfiltration capabilities via Discord webhooks.

This stealer, a part of the Cmimai malware household, represents a regarding evolution in information-stealing ways that leverage respectable communication platforms to bypass conventional safety measures.

The malware operates via a rigorously orchestrated multi-stage assault course of, starting with the execution of a VBS script that instantly establishes persistence on contaminated techniques.

Upon initialization, Silent Watcher systematically gathers complete system data via Home windows Administration Instrumentation (WMI) queries, accumulating particulars in regards to the working system, consumer credentials, and laptop specs.

System Data Assortment (Supply – K7 Safety Labs)

K7 Safety Labs researchers recognized this specific pressure via its distinctive operational signature and distinctive webhook communication patterns.

What makes Silent Watcher significantly harmful is its skill to stay undetected whereas constantly monitoring sufferer techniques.

The malware creates a number of PowerShell scripts dynamically, together with “vbs_ps_browser.ps1” for browser metadata extraction and “vbs_ps_diag.ps1” for screenshot seize performance.

Operational Workflow (Supply – K7 Safety Labs)

These scripts are designed to avoid PowerShell execution insurance policies and function with minimal system affect.

The stealer’s exfiltration mechanism demonstrates refined technical implementation, using each WinHttp.WinHttpRequest.5.1 and MSXML2.ServerXMLHTTP objects as fallback mechanisms.

This redundancy ensures dependable knowledge transmission even in restricted community environments.

The malware codecs stolen knowledge as JSON payloads earlier than transmitting to Discord webhooks, making the visitors seem as respectable communication.

Superior Persistence and Evasion Mechanisms

Silent Watcher employs a very crafty persistence technique via timed execution cycles.

After finishing its preliminary knowledge assortment part, the malware enters an infinite loop with exactly calculated one-hour intervals, as demonstrated within the code:-

Dim oneHourMs: oneHourMs = 3600000
Do
LogAction “Sleeping for 1 hour..”
WScript.Sleep oneHourMs
LogAction “Hourly interval: Making an attempt diagnostic report…”
Name AttemptDiagnosticReportViaPS()
Loop

This timing mechanism permits the malware to constantly seize up to date screenshots and system states with out triggering instant suspicion.

The stealer creates short-term recordsdata with randomized names within the system’s short-term folder, systematically cleansing up after every operation to attenuate forensic traces.

vbs_reporter_log.txt (Supply – K7 Safety Labs)

All actions are meticulously logged in “vbs_reporter_log.txt”, offering attackers with detailed operational suggestions whereas sustaining operational safety via automated file cleanup procedures.

Equip your SOC with full entry to the newest risk knowledge from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Attacking, Data, Discord, Exfiltrate, Silent, Systems, Watcher, Webhook, Windows

Post navigation

Previous Post: CastleLoader Malware Infected Over 400+ Devices Using Cloudflare-Themed ClickFix Phishing Attack
Next Post: Meta’s New Feature Transforms Instagram to a New Real-Time Location Broadcaster

Related Posts

Hackers Leverage Google Forms Surveys to Trick Victims into Stealing Cryptocurrency Cyber Security News
Microsoft Edge Fixes Actively Exploited Chromium Vulnerability Cyber Security News
New HTTP/2 MadeYouReset Vulnerability Enables Large-Scale DDoS Attacks Cyber Security News
New Spear-Phishing Attack Delivers DarkCloud Malware to Steal Keystrokes, FTP Credentials and Others Cyber Security News
Amazon EKS Vulnerabilities Exposes Sensitive AWS Credentials and Escalate Privileges Cyber Security News
Fake Postmark MCP Server Silently Stole Thousands of Emails With a Single Line of Malicious Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News