Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

KimJongRAT Attacking Windows Users via Weaponized .hta Files to Steal Logins

Posted on December 1, 2025December 1, 2025 By CWS

A brand new distant entry trojan dubbed KimJongRAT has surfaced, posing a extreme menace to Home windows customers.

This refined malware is believed to be orchestrated by the Kimsuky group, a menace actor with alleged state backing.

The marketing campaign usually begins with a phishing e-mail containing a misleading archive named Nationwide Tax Discover, which lures unsuspecting victims into initiating the an infection chain.

Upon opening the malicious archive, customers are introduced with a shortcut file disguised as a professional PDF doc.

Tax discover.pdf (Supply – Alyac)

When executed, this shortcut file triggers a hidden command that decodes a Base64 URL and abuses the professional Microsoft HTML Utility utility to contact a distant server.

This course of stealthily downloads a further payload often known as tax.hta, successfully bypassing normal safety checks.

Alyac safety analysts recognized that this loader script is applied in VBScript and employs intelligent evasion methods.

The malware makes an attempt to evade detection by using professional providers like Google Drive to host its malicious parts.

As soon as lively, the loader retrieves each decoy paperwork to trick the person and the precise malicious binaries required for the subsequent stage of the assault.

Exfiltration of delicate information

The first goal of this marketing campaign is the exfiltration of delicate private and monetary information.

The malware targets a wide selection of knowledge, together with system particulars, browser storage information, and encryption keys.

It particularly hunts for cryptocurrency pockets data and credentials for communication platforms like Telegram and Discord, making it a extremely harmful device for identification theft and monetary fraud.

Probably the most notable facet of KimJongRAT is its means to adapt its habits based mostly on the goal setting’s safety posture.

The malware executes a selected VBScript command to verify the standing of Home windows Defender earlier than continuing.

It makes use of the code snippet Set exec = oShell.Exec(ss) adopted by If InStr(output, “STOPPED”) > 0 Then to find out if the safety service is lively.

If Home windows Defender is disabled, the malware downloads a file named v3.log, which executes the first payload.

Conversely, if safety is lively, it retrieves another file referred to as pipe.log to avoid detection.

Whatever the path taken, the malware establishes persistence by registering itself within the system registry, guaranteeing it runs routinely to transmit stolen information periodically.

Record of cryptocurrency wallets hijacked by malware (Supply – Alyac)

Whereas the Record of cryptocurrency wallets hijacked by malware highlights the breadth of focused functions, it additionally highlights the precise monetary intent behind this tailor-made menace.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attacking, Files, HTA, KimJongRAT, Logins, Steal, Users, Weaponized, Windows

Post navigation

Previous Post: Operation Hanoi Thief Attacking IT Professionals with Pseudo-Polyglot Payload to Hide Malware
Next Post: Chinese Front Companies Providing Advanced Steganography Solutions for APT Operations

Related Posts

New Agent-Aware Cloaking Leverages OpenAI ChatGPT Atlas Browser to Deliver Fake Content Cyber Security News
Better Auth API keys Vulnerability Let Attackers Create Privileged Credentials For Arbitrary Users Cyber Security News
CISA Warns of Git Arbitrary File Write Vulnerability Exploited in Attacks Cyber Security News
Weaponized LNK File Disguised as Credit Card Security Email Steals User Data Cyber Security News
Microsoft Office.com Suffers Major Outage, Investigation Underway Cyber Security News
FIN6 Hackers Mimic as Job Seekers to Target Recruiters with Weaponized Resumes Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark