Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Operation Silk Lure Weaponizing Windows Scheduled Tasks to Drop ValleyRAT

Posted on October 16, 2025October 16, 2025 By CWS

Over the previous month, a focused marketing campaign dubbed Operation Silk Lure has surfaced, exploiting the Home windows Activity Scheduler to deploy a novel variant of ValleyRAT.

Rising in mid-2025, the operation hinges on spear-phishing emails that carry malicious LNK attachments masquerading as candidate resumes.

When victims open these attachments, a hidden PowerShell command initiates the obtain of a decoy doc and two executables: a loader (keytool.exe) and its side-loaded DLL (jli.dll).

Preliminary evaluation reveals that the phishing lure is crafted for Chinese language fintech and buying and selling corporations’ HR departments.

The malicious LNK file comprises an obfuscated PowerShell one-liner, which silently retrieves payloads from a command-and-control (C2) server hosted in the US.

As soon as executed, the dropper writes a VBScript named CreateHiddenTask.vbs into the consumer’s AppData folder, then runs it to determine persistence.

Seqrite researchers famous that this script programmatically registers a every day scheduled process named “Safety,” spoofing Microsoft Company because the writer, and instantly deletes itself to hinder detection.

Following the persistence step, the loader binary (keytool.exe) launches and makes use of DLL side-loading to execute jli.dll.

This DLL locates an 8-byte marker in its personal file, extracts the next encrypted payload, and performs RC4 decryption with a hard-coded key.

An infection chain (Supply – Seqrite)

The decrypted shellcode is injected straight into reminiscence, establishing contact with the C2 server at 206.119.175.16 and starting reconnaissance and exfiltration.

Seqrite researchers famous that when inside, ValleyRAT engages in intensive information harvesting and defense-evasion maneuvers.

It fingerprints the host—accumulating CPU particulars, display screen decision, and NIC data—whereas checking for virtualization or identified antivirus merchandise through WMI queries.

Detected safety companies, together with 360Safe and Kingsoft, have their community connections forcefully terminated. All actions are logged and transmitted covertly over HTTPS, elevating the chance of credential theft and company espionage.

An infection Mechanism and Persistence

A more in-depth take a look at the an infection chain uncovers the class of its persistence tactic. The VBScript used to register the scheduled process leverages COM interfaces to work together with the Activity Scheduler.

Beneath is the core snippet from CreateHiddenTask.vbs:-

Set service = CreateObject(“Schedule.Service”)
service. Join
Set rootFolder = service.GetFolder(“”)
Set taskDef = service.NewTask(0)
With taskDef.RegistrationInfo
.Creator = “Microsoft Company”
Finish With
With taskDef.Triggers.Create(1) ‘ DAILY set off
.StartBoundary = “2025-08-01T08:00:01”
.DaysInterval = 1
Finish With
With taskDef.Actions.Create(0) ‘ EXEC motion
.Path = ExpandEnvironmentStrings(“%APPDATApercentkeytool.exe”)
Finish With
rootFolder.RegisterTaskDefinition “Safety”, taskDef, 6, “”, “”, 3

Upon registration, the duty executes keytool.exe each morning at 8:00 AM. This mechanism ensures the loader runs constantly, even after system reboots.

By embedding writer metadata and deleting the script, the menace actors mix into regular system exercise, complicating forensic investigations.

The mixture of LNK-based preliminary compromise, VBScript persistence, and DLL side-loading makes Operation Silk Lure a classy menace demanding up to date searching signatures and vigilant monitoring of scheduled duties.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Drop, Lure, Operation, Scheduled, Silk, Tasks, ValleyRAT, Weaponizing, Windows

Post navigation

Previous Post: Qilin Ransomware Using Ghost Bulletproof Hosting to Attack Organizations Worldwide
Next Post: LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets

Related Posts

New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways Cyber Security News
List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities Cyber Security News
Sensata Technologies Hit by Ransomware Attack Cyber Security News
New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control Cyber Security News
Azure Apps Vulnerability Lets Hackers Create Malicious Apps Mimicking Microsoft Teams Cyber Security News
Pakistani Actors Built 300+ Cracking Websites Used to Deliver Info-Stealer Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark