Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Using PUP Advertisements to Silently Drop Windows Malware

Posted on August 25, 2025August 25, 2025 By CWS

In latest weeks, cybersecurity investigators have uncovered a novel marketing campaign wherein hackers leverage seemingly benign doubtlessly undesirable program (PUP) ads to ship stealthy Home windows malware.

The lure usually begins with advertisements selling free PDF instruments or desktop assistants that redirect victims to spoofed obtain websites.

As soon as customers click on by, a scheduled process silently retrieves a JavaScript loader from a brief listing and executes it through Microsoft HTML Utility Host (MSHTA).

This sequence installs a decoy utility—ManualFinder—designed to look legit whereas establishing footholds in goal environments.

The decoy’s innocuous performance masks a much more insidious goal. When run, ManualFinder requests no person interplay past the preliminary set up, quietly opening ports and relaying instructions to distant infrastructure.

Expel analysts recognized that the JavaScript loader reaches out to domains equivalent to mka3e8.com and 5b7crp.com, beforehand related to residential proxy companies, indicating a broader scheme to conscript contaminated machines into proxy networks.

Whereas preliminary infections have been linked to OneStart Browser installs, researchers noticed that AppSuite-PDF and PDFEditor installers observe similar patterns, every signed by doubtful code-signing certificates from entities like “GLINT SOFTWARE SDN. BHD.”

Expel researchers recognized that the malware marketing campaign’s impression extends past proxying. In sure environments, PDFEditor installations immediate customers to consent to residential proxy use in trade free of charge modifying capabilities, successfully monetizing unsuspecting endpoints.

Different situations present the decoy apps modifying browser profiles and harvesting saved cookies, suggesting secondary data-exfiltration aims.

By the point defenders detect uncommon MSHTA invocations or node.exe processes operating hidden JavaScript, the adversary has usually already established persistence and community outposts.

In complete, investigators have cataloged over 70 distinctive JavaScript variants, all reaching out to the identical malicious domains.

Code snippets embedded in scheduled-task definitions reveal how persistence is maintained:-

schtasks /Create /TN “ManualFinderTask” /TR “mshta.exe “C:CustomersAppDataLocalTemp.js”” /SC DAILY /ST 03:00

Scheduled process creation invoking MSHTA (Supply – Expel)

The loader then executes:-

cmd[.]exe /d /s /c “msiexec /qn /i “C:CustomersAppDataLocalTEMPManualFinder-v2.0.196.msi””

ManualFinder (Supply – Expel)

An infection Mechanism

Delving deeper into the an infection mechanism, the marketing campaign exploits Home windows scripting hosts and MSI installer options to realize near-undetectable deployment.

The sequence begins when the scheduled process runs below the context of the SYSTEM-level svchost service, launching node.exe with a randomized JavaScript filename (e.g., 9b9797f4-274c-fbb9-81ae-3b4f33b7010a.js).

This script downloads the ManualFinder MSI from the attacker’s server and installs it with quiet flags (/qn /n) to suppress any person interface.

As a result of msiexec runs below cmd[.]exe with disabled autorun (/d) and customized quote dealing with (/s), conventional EDR alerts tied to person purposes are sometimes bypassed.

PDF Editor (Supply – Expel)

As soon as put in, the malware registers its personal service and scheduled duties to re-execute the JavaScript loader at common intervals, guaranteeing re-infection even after removing makes an attempt.

This illustrates the MSHTA invocation code that permits this stealthy execution.

Enhance your SOC and assist your staff defend what you are promoting with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Advertisements, Drop, Hackers, Malware, PUP, Silently, Windows

Post navigation

Previous Post: Chinese APT Hackers Using Proxy and VPN Service to Anonymize Infrastructure
Next Post: Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads

Related Posts

Countering Spear Phishing with Advanced Email Security Solutions Cyber Security News
DarkCloud Stealer Employs New Infection Chain and ConfuserEx-Based Obfuscation Cyber Security News
AMD Warns of Transient Scheduler Attacks Affecting Wide Range of Chipsets Cyber Security News
CISA Releases Guide to Protect Network Edge Devices From Hackers Cyber Security News
How to Detect and Mitigate Insider Threats in Your Organization Cyber Security News
PoC Exploit Released for Critical WebDAV 0-Day RCE Vulnerability Exploited by APT Hackers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Understand Cyber Insurance Policies
  • UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats
  • Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3
  • OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail
  • Hackers Sabotage Iranian Ships Using Maritime Communications Terminals in Its MySQL Database

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Understand Cyber Insurance Policies
  • UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats
  • Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3
  • OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail
  • Hackers Sabotage Iranian Ships Using Maritime Communications Terminals in Its MySQL Database

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News