Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actor’s Using Copyright Takedown Claims to Deploy Malware

Posted on September 26, 2025September 26, 2025 By CWS

A complicated malware marketing campaign orchestrated by the Vietnamese Lone None menace actor group has been leveraging fraudulent copyright infringement takedown notices to deploy information-stealing malware onto unsuspecting victims’ techniques.

The marketing campaign, which has been actively tracked since November 2024, represents a regarding evolution in social engineering techniques that exploits authentic authorized considerations to bypass conventional safety consciousness measures.

The malicious operation facilities round spoofed e-mail communications that impersonate numerous authorized corporations from all over the world, claiming copyright violations on victims’ Fb pages or web sites.

A pattern Copyright-themed marketing campaign e-mail containing an embedded hyperlink to a Python Installer (Supply – Cofense)

These rigorously crafted emails reference actual Fb accounts belonging to the recipients, including an alarming degree of authenticity that will increase the probability of profitable deception.

The menace actors have demonstrated exceptional linguistic versatility, creating e-mail templates in at the least ten totally different languages together with English, French, German, Korean, Chinese language, and Thai, seemingly using machine translation instruments to develop their international attain.

The execution flowchart for the typical Lone None Stealer pattern (Supply – Cofense)

Cofense analysts recognized this marketing campaign as significantly harmful attributable to its supply of two main malware payloads: Pure Logs Stealer and a newly found info stealer dubbed Lone None Stealer, often known as PXA Stealer.

The marketing campaign’s sophistication extends past conventional malware distribution, using novel methods similar to utilizing Telegram bot profiles to retailer payload URLs and leveraging authentic applications like Haihaisoft PDF Reader to evade detection mechanisms.

The assault chain begins with victims receiving copyright takedown emails containing embedded hyperlinks that redirect via URL shortening companies like tr.ee and goo.su earlier than finally resulting in file-sharing platforms similar to Dropbox and MediaFire.

These archive information comprise a combination of authentic paperwork alongside malicious parts, making a facade of authenticity whereas hiding the true malicious intent.

Superior An infection Mechanism and Payload Supply

The technical execution of this malware marketing campaign demonstrates exceptional sophistication in its multi-stage an infection course of.

Upon clicking the malicious hyperlink, victims obtain an archive file containing a authentic program, usually Haihaisoft PDF Reader, which has been maliciously repurposed to load a malicious DLL functioning as a Python installer.

The an infection chain progresses via a rigorously orchestrated sequence of authentic Home windows utilities to decode and execute the ultimate payload.

The malicious DLL exploits the built-in Home windows utility certutil.exe, initially designed for certificates administration, to decode an archive file that masquerades as a PDF doc however comprises the precise malware parts.

The next command demonstrates this system:-

cmd /c cd _ && begin Doc.pdf && certutil -decode Doc.pdf Bill.pdf && pictures.png x -ibck -y Bill.pdf C:CustomersPublic

Following profitable decoding, the marketing campaign makes use of a bundled WinRAR executable, deceptively named “pictures.png,” to extract the decoded archive contents to the C:UsersPublic listing.

This location alternative is strategic, because it gives write entry with out requiring administrative privileges whereas sustaining persistence throughout consumer periods.

The extracted Python set up features a malicious interpreter executable named “svchost.exe” that executes obfuscated Python scripts designed to ascertain communication with Telegram bot command and management infrastructure.

The malware achieves persistence via Home windows registry modifications, particularly creating startup entries in HKCUSOFTWAREMicrosoftWindowsCurrentVersionRun to make sure continued execution after system reboots.

The execution flowchart for ATR 378532 (Supply – Cofense)

The entire execution flowchart for the typical Lone None Stealer pattern, demonstrating the advanced multi-stage course of from preliminary an infection via remaining payload deployment.

The execution flowchart for ATR 377263 (Supply – Cofense)

The marketing campaign’s use of Telegram bots as each payload supply mechanisms and command-and-control infrastructure represents a big tactical evolution, permitting menace actors to take care of operational safety whereas leveraging authentic communication platforms to keep away from conventional community detection strategies.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Actors, Claims, Copyright, Deploy, Malware, Takedown, Threat

Post navigation

Previous Post: Living Security Unveils HRMCon 2025 Speakers as Report Finds Firms Detect Just 19% of Human Risk
Next Post: New Phishing Attack Targeting PyPI Maintainers to Steal Login Credentials

Related Posts

Future of Passwords Biometrics and Passwordless Authentication Cyber Security News
Massive Cyber-Attack Attacking macOS Users via GitHub Pages to Deliver Stealer Malware Cyber Security News
Lenovo Vantage Vulnerabilities Allow Attackers to Escalate Privileges as SYSTEM User Cyber Security News
1-Click Oracle Cloud Code Editor RCE Vulnerability Lets Attackers Upload Malicious Files Cyber Security News
SonicWall VPNs Exploited for 0-Day Vulnerability to Bypass MFA and Deploy Ransomware Cyber Security News
Quantum Threats Preparing Your Encryption Strategy Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News