Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Moonwalk++ PoC Shows How Malware Can Spoof Windows Call Stacks and Evade Elastic-Inspired Rules

Posted on December 17, 2025December 17, 2025 By CWS

A complicated proof-of-concept demonstrating how malware can bypass superior name stack detection mechanisms more and more adopted by enterprise safety distributors like Elastic.

The brand new Moonwalk++ method extends prior stack-spoofing analysis and divulges vital gaps in present endpoint detection methods.

 possible reminiscence location

The Evasion Problem

As defenders more and more depend on name stack telemetry to establish malicious exercise, attackers are creating extra superior countermeasures.

Introduces strategies to spoof name stacks whereas concurrently encrypting malware in reminiscence capabilities beforehand thought of infeasible.

Elastic Safety Labs lately printed detection logic designed to establish anomalous name stacks by analyzing execution patterns, caller identification, and reminiscence traits.

Spoof goal operate

Moonwalk++ circumvents these protections by way of a number of evasion vectors. The PoC demonstrates three vital bypasses:

Name Instruction Validation Bypass: Detection programs test whether or not directions previous return addresses are official CALL statements.

Researchers recognized Home windows devices that naturally comprise name directions at anticipated places, permitting spoofed frames to seem official.

Module Decision Evasion: Earlier implementations assumed the ultimate caller module would stay unresolvable. Moonwalk++ injects shellcode into official processes corresponding to OneDrive.exe, permitting devices to be sourced from the goal course of’s picture base slightly than system libraries.

The analysis, led by safety skilled Alessandro Magnosi (klezVirus), builds on the foundational Stack Moonwalk method offered at DEFCON 31.

In-Reminiscence Encryption: The method employs customized ROP chains to encrypt and modify the reminiscence protections of shellcode areas post-deployment

 A novel stack construction conceals these encryption routines inside invisible stack frames, sustaining a clear, unwindable name stack regardless of ongoing encryption operations.

Detection Failure

Testing towards common safety instruments yielded regarding outcomes. Hunt-Sleeping-Beacons, Get-InjectedThreadEx, and even the Eclipse detection algorithm didn’t establish Moonwalk++ exercise.

Whereas hollows_hunter may detect encrypted artifacts by way of obfuscation evaluation, name stack inspection strategies proved ineffective.

The analysis highlights a elementary weak point in stack-based detection: it depends on assumptions about official execution patterns and reminiscence traits. When these assumptions fail, detection mechanisms develop into bypassed.

Evasion Analysis

The whole code is obtainable on GitHub as “Moonwalk–” (hyphens used because of platform restrictions), alongside complete technical documentation.

Researchers emphasize that this work demonstrates the depth of name stack evasion capabilities when strategies are absolutely optimized, difficult present assumptions underlying fashionable endpoint detection methods.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Call, ElasticInspired, Evade, Malware, Moonwalk, PoC, Rules, Shows, Spoof, Stacks, Windows

Post navigation

Previous Post: See Threats to Your Industry & Country in Real Time
Next Post: CISA Adds Fortinet Vulnerability to KEV Catalog After Active Exploitation

Related Posts

ChatGPT Hacked Using Custom GPTs Exploiting SSRF Vulnerability to Expose Secrets Cyber Security News
PhantomRaven Attack Involves 126 Malicious npm Packages with Over 86,000 Downloads Hiding Malicious Code Cyber Security News
Jetflicks Illegal Paid Streaming Service Operators Jailed for 7 Years Cyber Security News
GOLD BLADE Using Custom QWCrypt Locker that Allows Data Exfiltration and Ransomware Deployment Cyber Security News
LegalPwn Attack Exploits Gemini, ChatGPT and other AI Tools into Executing Malware Cyber Security News
Chinese Hackers Weaponizes Software Vulnerabilities to Compromise Their Targets Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • INE Security Expands Across Middle East and Asia to Accelerate Cybersecurity Upskillin
  • OpenAI GPT-5.2-Codex Supercharges Agentic Coding and Cyber Vulnerability Detection
  • China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware
  • New Udados Botnet Launches Massive HTTP Flood DDoS Attacks Targeting Tech Sector
  • UEFI Vulnerability in Major Motherboards Enables Early-Boot Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • INE Security Expands Across Middle East and Asia to Accelerate Cybersecurity Upskillin
  • OpenAI GPT-5.2-Codex Supercharges Agentic Coding and Cyber Vulnerability Detection
  • China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware
  • New Udados Botnet Launches Massive HTTP Flood DDoS Attacks Targeting Tech Sector
  • UEFI Vulnerability in Major Motherboards Enables Early-Boot Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark