Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks

Posted on August 13, 2025August 13, 2025 By CWS

Aug 13, 2025Ravie LakshmananMalvertising / Cryptocurrency
Cybersecurity researchers have found a brand new malvertising marketing campaign that is designed to contaminate victims with a multi-stage malware framework known as PS1Bot.
“PS1Bot includes a modular design, with a number of modules delivered used to carry out a wide range of malicious actions on contaminated techniques, together with info theft, keylogging, reconnaissance, and the institution of persistent system entry,” Cisco Talos researchers Edmund Brumaghin and Jordyn Dunk stated.
“PS1Bot has been designed with stealth in thoughts, minimizing persistent artifacts left on contaminated techniques and incorporating in-memory execution strategies to facilitate execution of follow-on modules with out requiring them to be written to disk.”
Campaigns distributing the PowerShell and C# malware have been discovered to be energetic since early 2025, leveraging malvertising as a propagation vector, with the an infection chains executing modules in-memory to attenuate forensic path. PS1Bot is assessed to share technical overlaps with AHK Bot, an AutoHotkey-based malware beforehand put to make use of by risk actors Asylum Ambuscade and TA866.

Moreover, the exercise cluster has been recognized as overlapping with earlier ransomware-related campaigns using a malware named Skitnet (aka Bossnet) with an goal to steal knowledge and set up distant management over compromised hosts.
The start line of the assault is a compressed archive that is delivered to victims by way of malvertising or search engine marketing (search engine optimisation) poisoning. Current throughout the ZIP file is a JavaScript payload that serves as a downloader to retrieve a scriptlet from an exterior server, which then writes a PowerShell script to a file on disk and executes it.
The PowerShell script is chargeable for contacting a command-and-control (C2) server and fetching next-stage PowerShell instructions that enable the operators to reinforce the malware’s performance in a modular style and perform a variety of actions on the compromised host –

Antivirus detection, which obtains and experiences the listing of antivirus packages current on the contaminated system
Display seize, which captures screenshots on contaminated techniques and transmits the ensuing pictures to the C2 server
Pockets grabber, which steals knowledge from net browsers (and pockets extensions), utility knowledge for cryptocurrency pockets functions, and information containing passwords, delicate strings, or pockets seed phrases
Keylogger, which logs keystrokes and gathers clipboard content material
Data assortment, which harvests and transmits details about the contaminated system and atmosphere to the attacker
Persistence, which creates a PowerShell script such that it is routinely launched when the system restarts, incorporating the identical logic used to determine the C2 polling course of to fetch the modules

“The knowledge stealer module implementation leverages wordlists embedded into the stealer to enumerate information containing passwords and seed phrases that can be utilized to entry cryptocurrency wallets, which the stealer additionally makes an attempt to exfiltrate from contaminated techniques,” Talos famous.

“The modular nature of the implementation of this malware offers flexibility and permits the speedy deployment of updates or new performance as wanted.”
The disclosure comes as Google stated it is leveraging synthetic intelligence (AI) techniques powered by giant language fashions (LLMs) to combat invalid visitors (IVT) and extra exactly establish advert placements producing invalid behaviors.
“Our new functions present quicker and stronger protections by analyzing app and net content material, advert placements and person interactions,” Google stated. “For instance, they’ve considerably improved our content material overview capabilities, resulting in a 40% discount in IVT stemming from misleading or disruptive advert serving practices.”

The Hacker News Tags:Attacks, Campaign, Deploy, InMemory, Malvertising, Malware, MultiStage, PS1Bot

Post navigation

Previous Post: New Multi-Stage Tycoon2FA Phishing Attack Now Beats Top Security Systems
Next Post: Microsoft Office Vulnerabilities Let Attackers Execute Remote Code

Related Posts

CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers The Hacker News
Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse The Hacker News
The Blind Spot Fueling Payment Skimmer Attacks The Hacker News
React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors The Hacker News
A Healthcare CISO’s Journey to Enabling Modern Care The Hacker News
New Flodrix Botnet Variant Exploits Langflow AI Server RCE Bug to Launch DDoS Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark