Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
MastaStealer Weaponizes Windows LNK Files, Executes PowerShell Command, and Evades Defender

MastaStealer Weaponizes Windows LNK Files, Executes PowerShell Command, and Evades Defender

Posted on November 13, 2025November 13, 2025 By CWS

A newly documented malware marketing campaign demonstrates how attackers are leveraging Home windows LNK shortcuts to ship the MastaStealer infostealer.

The assault begins with spear-phishing emails containing ZIP archives with a single LNK file that executes a multi-stage an infection course of.

When victims click on the malicious shortcut, it launches Microsoft Edge whereas opening the AnyDesk web site within the foreground to look official.

In the meantime, within the background, the LNK file silently downloads and executes an MSI installer from a compromised area.

The an infection chain reveals refined evasion strategies. The MSI installer extracts its payload to a hidden listing construction below %LOCALAPPDATApercentTempMW-files.cab, then decompresses the contents and drops the precise C2 beacon at %LOCALAPPDATApercentMicrosoftWindowsdwm.exe.

This filename mimics official Home windows Show Window Supervisor processes, making detection tougher for safety instruments.

The marketing campaign efficiently bypassed conventional detection strategies by way of cautious file placement and course of naming conventions.

Maurice Fielenbach, Infosec Analysis and Safety Trainings analyst, recognized this an infection after discovering Home windows Installer occasion logs displaying Utility Occasion ID 11708 failures.

The alert was triggered as a result of the compromised consumer lacked native administrator privileges, inflicting the MSI deployment to fail unexpectedly.

This failure, paradoxically, saved the system from full compromise and revealed the assault to defenders.

PowerShell-Based mostly Defender Exclusion

Essentially the most important facet of this marketing campaign entails the PowerShell command executed throughout set up to disable Home windows Defender protections.

The malware runs the next command to create an exclusion path for its C2 beacon: Add-MpPreference -ExclusionPath “C:UsersadminAppDataLocalMicrosoftWindowsdvm.exe”.

This single command removes the Home windows Defender real-time scanning for the malware executable, permitting it to speak freely with command and management servers at cmqsqomiwwksmcsw[.]xyz (38.134.148.74) and ykgmqooyusggyyya[.]xyz (155.117.20.75).

The approach demonstrates how attackers bypass trendy endpoint safety by exploiting official Home windows administration options somewhat than forcing their manner by way of safety controls.

Organizations ought to monitor for uncommon PowerShell execution with MpPreference parameters and implement utility whitelisting to stop unauthorized Defender modifications.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Command, Defender, Evades, Executes, Files, LNK, MastaStealer, PowerShell, Weaponizes, Windows

Post navigation

Previous Post: 1,000+ Servers Hit in Law Enforcement Takedown of Rhadamanthys, VenomRAT, Elysium
Next Post: ChatGPT Vulnerability Exposed Underlying Cloud Infrastructure

Related Posts

Critical FortiWeb WAF Flaw Exploited in the Wild, Enabling Full Admin Takeover Critical FortiWeb WAF Flaw Exploited in the Wild, Enabling Full Admin Takeover Cyber Security News
iOS 26 Deletes Pegasus and Predator Spyware Infection Evidence by Overwriting The ‘shutdown.log’ file on Reboot iOS 26 Deletes Pegasus and Predator Spyware Infection Evidence by Overwriting The ‘shutdown.log’ file on Reboot Cyber Security News
GravityRAT with Remote Access Capabilities Attacking Windows, Android, and macOS Systems GravityRAT with Remote Access Capabilities Attacking Windows, Android, and macOS Systems Cyber Security News
Lumma Infostealers Developers Trying Hard To Conduct Business As Usual Lumma Infostealers Developers Trying Hard To Conduct Business As Usual Cyber Security News
RainyDay, Turian and Naikon Malwares Abuse DLL Search Order to Execute Malicious Loaders RainyDay, Turian and Naikon Malwares Abuse DLL Search Order to Execute Malicious Loaders Cyber Security News
INE Earns Multiple G2 Winter 2026 Badges Across Global Markets INE Earns Multiple G2 Winter 2026 Badges Across Global Markets Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 287 Chrome Extensions Breach Privacy of Millions
  • Managing Technical Debt in AI-Driven Software Development
  • NPM’s ‘duer-js’ Package Spreads Malware to Windows & Discord
  • Critical Flaw in WordPress Plugin Risks Site Security
  • Google Chrome Update: Critical Security Fixes Released

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 287 Chrome Extensions Breach Privacy of Millions
  • Managing Technical Debt in AI-Driven Software Development
  • NPM’s ‘duer-js’ Package Spreads Malware to Windows & Discord
  • Critical Flaw in WordPress Plugin Risks Site Security
  • Google Chrome Update: Critical Security Fixes Released

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark