Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Impersonate as MalwareBytes to Attack Users and Steal Logins

Posted on January 19, 2026January 19, 2026 By CWS

A brand new malware marketing campaign has emerged that tips folks into downloading pretend Malwarebytes software program, placing their login credentials and cryptocurrency wallets at critical threat.

Safety researchers found this operation actively spreading between January 11 and January 15, 2026, utilizing specifically crafted ZIP recordsdata that impersonate official Malwarebytes installers.

The pretend recordsdata are named malwarebytes-windows-github-io-X.X.X.zip, making them seem genuine to unsuspecting customers who consider they’re downloading real antivirus safety.

The marketing campaign’s major aim facilities on delivering an information-stealing malware that harvests delicate consumer information.

Content material of the TXT file (Supply – VirusTotal)

These malicious ZIP archives include a harmful mixture of recordsdata designed to bypass safety defenses and set up persistence on contaminated programs.

When customers extract and run what seems to be the official Malwarebytes executable, they unknowingly set off a series of malicious occasions that finally compromises their digital safety and private data.

VirusTotal analysts recognized the malware after analyzing the an infection patterns and file constructions, noting that every one suspicious ZIP archives share a constant identifier often called a behash worth of “4acaac53c8340a8c236c91e68244e6cb.”

This technical marker grew to become essential in monitoring the marketing campaign’s scope and figuring out extra variants used within the operation.

The researchers documented how the malware operates via a complicated layering approach that makes detection and evaluation tougher.

DLL Sideloading: The Assault Mechanism

The assault depends on a misleading approach referred to as DLL sideloading, which exploits how Home windows masses official software program libraries. The malicious payload is hidden inside a file named CoreMessaging.dll.

The recognized DLLs (Supply – VirusTotal)

When the official Malwarebytes executable runs, the working system masses this malicious DLL as an alternative of the real library file.

Risk actors place each the pretend DLL and bonafide EXE in the identical folder, tricking Home windows into executing the malware with out elevating suspicion.

The malicious DLLs function distinctive metadata together with signature strings like “© 2026 Eosinophil LLC” and strange exported capabilities containing alphanumeric sequences resembling “15Mmm95ml1RbfjH1VUyelYFCf” and “2dlSKEtPzvo1mHDN4FYgv.”

These traits enable safety researchers to hunt for associated samples and observe the broader marketing campaign.

As soon as the malicious DLL executes, it drops secondary-stage infostealers that particularly goal cryptocurrency pockets data and saved browser credentials, enabling attackers to commit identification theft and cryptocurrency theft.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Actors, Attack, Impersonate, Logins, Malwarebytes, Steal, Threat, Users

Post navigation

Previous Post: Attackers Redirected Employee Paychecks Without Breaching a Single System
Next Post: Threat Actors Weaponizing Visual Studio Code to Deploy a Multistage Malware

Related Posts

Microsoft Unveils Hardware-Accelerated BitLocker to Enhance Performance and Security Cyber Security News
Microsoft Details on Fixing Error “Identify Which Process Is Blocking a File in Windows” With Built-in Tools Cyber Security News
Hackers are Weaponizing Invoices to Deliver XWorm That Steals Login Credentials Cyber Security News
MongoDB Server Pre-Authentication Vulnerability Let Attackers Trigger DoS Condition Cyber Security News
New Clickfix Attack Exploits finger.exe Tool to Trick Users into Execute Malicious Code Cyber Security News
GhostBat RAT Android Malware With Fake RTO Apps Steals Targeting Indian Users to Steal Banking Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Weaponizing Visual Studio Code to Deploy a Multistage Malware
  • Threat Actors Impersonate as MalwareBytes to Attack Users and Steal Logins
  • Attackers Redirected Employee Paychecks Without Breaching a Single System
  • Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites
  • New Spear-Phishing Attack Abusing Google Ads to Deliver EndRAT Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Weaponizing Visual Studio Code to Deploy a Multistage Malware
  • Threat Actors Impersonate as MalwareBytes to Attack Users and Steal Logins
  • Attackers Redirected Employee Paychecks Without Breaching a Single System
  • Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites
  • New Spear-Phishing Attack Abusing Google Ads to Deliver EndRAT Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark