Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

RenderShock 0-Click Vulnerability Executes Payloads via Background Process Without User Interaction

Posted on July 14, 2025July 14, 2025 By CWS

A complicated zero-click assault methodology referred to as RenderShock that exploits passive file preview and indexing behaviors in trendy working programs to execute malicious payloads with out requiring any person interplay. 

Not like conventional phishing campaigns that depend on customers clicking malicious hyperlinks or opening contaminated attachments, RenderShock leverages built-in system automation options to realize compromise via authentic background processes.

Key Takeaways1. RenderShock assaults exploit file preview programs with out requiring person interplay.2. Impacts Home windows Explorer, macOS Fast Look, and automated file indexing providers.3. Makes use of malicious LNK recordsdata, PDFs, and Workplace paperwork to set off NTLM theft and code execution.4. Allows credential harvesting and distant entry; requires disabling preview panes and blocking SMB visitors.

RenderShock 0-Click on Vulnerability

CYFIRMA reviews that RenderShock targets a number of passive execution surfaces that mechanically have interaction with file content material with out specific person motion. 

The vulnerability impacts Home windows Explorer Preview Pane, macOS Fast Look, e-mail shopper preview programs, and file indexing providers, together with Home windows Search Indexer and Highlight. 

RenderShock Passive Execution Circulate

These programs course of recordsdata in reminiscence, usually invoking registered preview handlers that may set off malicious code execution.

The assault methodology exploits preview subsystems by embedding malicious logic in doc metadata, using UNC paths for NTLM credential harvesting, and leveraging Workplace macro execution throughout preview rendering. 

For instance, a crafted PDF with exterior references can set off outbound SMB connections when processed by preview handlers, doubtlessly leaking NTLMv2 hashes to attacker-controlled servers.

RenderShock employs each foundational and superior payload strategies. Foundational payloads embody malicious LNK recordsdata with UNC icon paths that trigger Home windows Explorer to provoke NTLM authentication when searching folders, and RTF recordsdata containing INCLUDEPICTURE discipline injections that fetch distant sources throughout preview. 

Superior strategies contain polyglot file codecs that confuse a number of parsers, distant template injection in Workplace paperwork with out macros, and poisoned ICC coloration profiles in photographs.

A typical assault chain includes making a malicious .lnk file with a distant icon path (attacker-ipicon.ico), embedding it in a ZIP archive, and delivering it via helpdesk portals or shared directories. 

When customers preview the ZIP contents, Home windows mechanically makes an attempt to load the distant icon, triggering SMB authentication requests that may be intercepted utilizing instruments like Responder:

Mitigations

The vulnerability permits a number of assault vectors, together with reconnaissance via passive beacons, credential theft through NTLMv2 harvesting, and distant code execution via preview-based macro execution. 

Attackers can obtain persistence by inserting malicious .desktop recordsdata or LaunchAgents in trusted autostart directories, and carry out lateral motion utilizing harvested credentials.

Safety groups ought to implement complete defenses, together with disabling preview panes in Home windows Explorer and Fast Look on macOS, blocking outbound SMB visitors (TCP 445) to untrusted networks, and implementing macro blocking via Group Coverage. 

Organizations should additionally deploy behavioral monitoring to detect uncommon community exercise from preview-related processes like explorer.exe, searchindexer.exe, and quicklookd.

The RenderShock framework demonstrates that trendy computing environments’ emphasis on person comfort creates silent execution paths that require no interplay, basically difficult conventional safety assumptions about file-based assaults and necessitating a reevaluation of how programs deal with passive file processing.

Examine stay malware conduct, hint each step of an assault, and make quicker, smarter safety choices -> Attempt ANY.RUN now 

Cyber Security News Tags:0click, Background, Executes, Interaction, Payloads, Process, RenderShock, User, Vulnerability

Post navigation

Previous Post: Retired US Air Force Employee Pleads Guilty for Sharing Military Secrets on a Dating App
Next Post: KongTuke Attacking Windows Users With New Interlock RAT Variant Using FileFix Technique

Related Posts

Halo Security Achieves SOC 2 Type 1 Compliance Cyber Security News
20+ Malicious Apps on Google Play Actively Attacking Users to Steal Login Credentials Cyber Security News
Microsoft Defender for Office 365 to Provide Detail Results for Spam, Phishing or Clean Emails Cyber Security News
AI Tools Like GPT Direct Users to Phishing Sites Instead of Legitimate Ones Cyber Security News
Hacktivist Group Claimed Attacks Across 20+ Critical Sectors Following Iran–Israel Conflict Cyber Security News
Apache HTTP Server 2.4.64 Released With Patch for 8 Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Practice Safe Torrenting
  • Wing FTP Server Vulnerability Actively Exploited
  • The Unusual Suspect: Git Repos
  • New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries
  • Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Practice Safe Torrenting
  • Wing FTP Server Vulnerability Actively Exploited
  • The Unusual Suspect: Git Repos
  • New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries
  • Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News