Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
DinDoor Backdoor Exploits Deno and MSI for Stealth Attacks

DinDoor Backdoor Exploits Deno and MSI for Stealth Attacks

Posted on April 22, 2026 By CWS

A newly discovered backdoor, known as DinDoor, has been identified utilizing the legitimate Deno JavaScript runtime alongside MSI installer files to evade detection and infiltrate targeted systems. This sophisticated malware, a variant of the Tsundere Botnet, employs signed runtime environments rather than traditional compiled implants, complicating detection processes in networks where Deno is either allowlisted or not closely monitored.

How DinDoor Infiltrates Systems

DinDoor is primarily distributed via phishing emails or malicious drive-by downloads masquerading as MSI files. Upon execution, these files download the Deno runtime from its official endpoint, dl.deno[.]land, circumventing the need for administrative privileges. Subsequently, the malware executes obfuscated JavaScript to gather system information, establish contact with its command-and-control (C2) infrastructure, and download further payloads.

Research conducted by Hunt.io, which analyzed samples uploaded to public databases, indicated significant behavioral variances between the DinDoor variants, despite their shared execution model. Their investigation uncovered that a solitary HuntSQL query focused on DinDoor’s HTTP response identified 20 active C2 servers dispersed across 15 autonomous systems at the time of their report.

Connections to Broader Threat Networks

Further analysis linked DinDoor’s activities to the Iranian APT group Seedworm, also recognized as MuddyWater, which has a history of targeting U.S. organizations. The malware’s association with a larger threat framework is alarming, with the C2 domain serialmenot[.]com being used by various ransomware operators and state-sponsored entities. Research from JUMPSEC correlated this domain with TAG-150, a group deploying it as a backend for a malware family named CastleLoader, with which DinDoor exhibits behavioral similarities.

Understanding DinDoor’s execution chain reveals its deliberate design to evade detection. One sample, migcredit.pdf.msi, uses msiexec.exe to drop a PowerShell script, launching it with hidden window flags and bypassing execution policy enforcement. The script checks for the presence of deno.exe, installing it if necessary, and decodes a base64-encoded JavaScript payload for execution.

Security Recommendations and Future Outlook

Security professionals are advised to consider any unexpected execution of deno.exe as a child of powershell.exe or wscript.exe as a high-priority alert. Organizations should restrict MSI execution using AppLocker or Windows Defender Application Control to mitigate DinDoor’s primary delivery vector. Monitoring command-line patterns like deno.exe -A data:application/javascript;base64 and TCP binds on specific localhost ports can aid in detecting infections.

To bolster defenses, network defenders should review HTTP logs for specific headers and consider blocking known malicious domains and communications with unreliable hosting providers. As the cybersecurity landscape evolves, staying vigilant and implementing proactive measures is crucial in safeguarding against emerging threats like DinDoor.

Cyber Security News Tags:APT group, Cybersecurity, Deno runtime, DinDoor backdoor, malware analysis, MSI installers, MuddyWater, network security, Phishing, Tsundere Botnet

Post navigation

Previous Post: UK Faces Rising Cyber Threats from Russia, Iran, China
Next Post: Venezuelan Energy Sector Hit by New Wiper Malware

Related Posts

Curly COMrades Hacker Group Using New Tools to Create Hidden Remote Access on Compromised Windows 10 Curly COMrades Hacker Group Using New Tools to Create Hidden Remote Access on Compromised Windows 10 Cyber Security News
New Quantum Route Redirect Tool Lets Attackers Launch One-Click Phishing Attacks on Microsoft 365 Users New Quantum Route Redirect Tool Lets Attackers Launch One-Click Phishing Attacks on Microsoft 365 Users Cyber Security News
TP-Link Security Flaws Allow DoS Attacks on Cameras TP-Link Security Flaws Allow DoS Attacks on Cameras Cyber Security News
Metasploit Releases 7 New Exploit Modules covering FreePBX, Cacti and SmarterMail Metasploit Releases 7 New Exploit Modules covering FreePBX, Cacti and SmarterMail Cyber Security News
Cybercriminals Exploit Homoglyphs to Mimic Trusted Websites Cybercriminals Exploit Homoglyphs to Mimic Trusted Websites Cyber Security News
Windows 11 PCs Fail to Shut Down After January Security Update Windows 11 PCs Fail to Shut Down After January Security Update Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rise in Supply Chain Attacks Highlights SBOM Challenges
  • Linux GoGra Backdoor Targets South Asia via Microsoft API
  • Mastodon Faces Major DDoS Attack Following Bluesky Incident
  • Venezuelan Energy Sector Hit by New Wiper Malware
  • DinDoor Backdoor Exploits Deno and MSI for Stealth Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rise in Supply Chain Attacks Highlights SBOM Challenges
  • Linux GoGra Backdoor Targets South Asia via Microsoft API
  • Mastodon Faces Major DDoS Attack Following Bluesky Incident
  • Venezuelan Energy Sector Hit by New Wiper Malware
  • DinDoor Backdoor Exploits Deno and MSI for Stealth Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark