Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Water Gamayun APT Hackers Exploit MSC EvilTwin Vulnerability to Inject Malicious Code

Posted on November 26, 2025November 26, 2025 By CWS

Water Gamayun, a persistent risk group, has lately intensified its efforts by exploiting a newly recognized MSC EvilTwin vulnerability (CVE-2025-26633) in Home windows techniques.

This malware marketing campaign is marked by its use of multi-stage assaults focusing on enterprise and authorities organizations, aiming to steal delicate data, credentials, and preserve long-term entry to networks.

Rising in 2025, these assaults mix subtle techniques—akin to leveraging trusted binaries and deep obfuscation—to bypass trendy safety controls whereas presenting customers with convincing lures, akin to pretend job paperwork.

The assault begins with a consumer’s net search that lands on a compromised web site. The web site silently strikes the sufferer to a lookalike area, delivering a malicious RAR file disguised as a PDF (masqueraded as “hiringassistant.pdf.rar”).

MSC Payload Disguised as PDF (Supply – Zscaler)

When the consumer opens this file, the embedded payload exploits the MSC EvilTwin vulnerability by dropping a crafted .msc file. This file is loaded by mmc.exe, which triggers hidden PowerShell instructions via the abuse of TaskPad snap-in instructions.

As Zscaler safety analysts recognized, the marketing campaign’s distinctive method combines a sequence of password-protected archives, window-hiding code, and staged payload execution to cover its tracks from each customers and automatic detection instruments.

The Zscaler analysis crew attributed this marketing campaign to Water Gamayun resulting from a number of robust markers, together with the uncommon abuse of the EvilTwin vulnerability, customized PowerShell obfuscation, and using decoy paperwork to decrease suspicion.

Their evaluation revealed that, after establishing an preliminary foothold, the malware chain leverages downloadable executables, archive extraction, and course of injection to develop its attain.

Multi-Stage Payload and Hidden Execution

On the core of Water Gamayun’s methodology is a layered an infection course of. After the disguised RAR file is opened, the payload writes an .msc file to disk.

When executed, mmc.exe interprets this file utilizing malicious snap-in information to run encoded PowerShell through TaskPad. The PowerShell script—the primary stage—downloads legit instruments like UnRAR.exe, then accesses password-protected archives containing extra payloads.

These scripts execute instructions akin to:-

-EncodedCommand JABX… | iex

A second-stage script compiles a .NET module to cover malware home windows from view, runs a decoy PDF, and drops the ultimate loader executable, ItunesC.exe. This loader allows long-term persistence by launching a number of cases and hiding community beacons to exterior IPs.

The marketing campaign highlights how superior obfuscation and multi-phase execution can evade detection, making it important for defenders to observe for uncommon file extensions, encoded PowerShell use, suspicious course of chains, and community exercise to related infrastructure.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:APT, Code, EvilTwin, Exploit, Gamayun, Hackers, Inject, Malicious, MSC, Vulnerability, Water

Post navigation

Previous Post: 10 Best Enterprise Remote Access Software
Next Post: Shai-Hulud v2 Campaign Spreads From npm to Maven, Exposing Thousands of Secrets

Related Posts

United Natural Foods Suffers Cyberattack Cyber Security News
Hackers Exploit SimpleHelp RMM Tool to Deploy DragonForce Ransomware Cyber Security News
Gemini CLI Vulnerability Allows Hackers to Execute Malicious Commands on Developer Systems Cyber Security News
AI Browsers Bypass Content PayWall Mimicking as a Human-User Cyber Security News
Help TDS Weaponize Legitimate Sites’ PHP Code Templates With Fake Microsoft Windows Security Alert Pages Cyber Security News
Top 3 Evasion Techniques In Phishing Attacks: Real Examples Inside  Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark