Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
JavaScript and PowerShell Malware Targets Cryptocurrency

JavaScript and PowerShell Malware Targets Cryptocurrency

Posted on May 19, 2026 By CWS

A new wave of malware is covertly targeting cryptocurrency transactions worldwide, employing sophisticated methods to avoid detection. This campaign, identified by cybersecurity researchers, is centered on a complex multi-stage loader known as CountLoader, which collaborates with JavaScript, PowerShell, and shellcode to execute its malicious activities.

CountLoader’s Global Impact

The malware campaign has infected tens of thousands of machines across various continents. Researchers from McAfee Labs, who documented these findings, report that around 86,000 unique systems have been compromised. The infection predominantly affects India, Indonesia, and the United States, with significant activity throughout Southeast Asia.

The malware initiates its attack with a malicious executable file that triggers a PowerShell command. This command retrieves an obfuscated JavaScript loader, executed through the mshta.exe utility, which is commonly exploited due to its trusted status in Windows.

Techniques for Stealth and Spread

CountLoader employs multiple techniques to remain undetected. After the initial executable is run, a scheduled task is activated every 30 minutes to maintain persistence. The PowerShell script decodes a Base64 payload, executing it via Invoke-Expression, a method that obscures the code from being written to disk.

The malware also propagates through USB drives by replacing files with LNK shortcuts, enabling silent execution of the malware while appearing to open legitimate files. This method accounts for approximately 9,000 infections.

Cryptocurrency Clipper and EtherHiding Technique

At its core, the malware functions as a cryptocurrency clipper, monitoring clipboard activity to replace wallet addresses with those controlled by attackers, thus redirecting funds without user awareness. The final payload employs an innovative approach known as EtherHiding, locating its command server address through the Ethereum blockchain, making it resilient to takedowns.

Researchers assessed the campaign’s scope by commandeering a backup command-and-control domain, redirecting traffic to their server to observe the malware’s actions.

Users can mitigate risks by avoiding untrusted executable files, carefully managing USB drives, verifying wallet addresses before transactions, and maintaining updated security software.

In the face of evolving cyber threats, understanding and adapting to new attack methodologies is crucial for safeguarding digital assets.

Cyber Security News Tags:Blockchain, clipper malware, CountLoader, crypto transactions, Cryptocurrency, cyber attack, cyber threat, Cybersecurity, EtherHiding, JavaScript, Malware, McAfee Labs, PowerShell, security software, USB infection

Post navigation

Previous Post: Microsoft Halts Malware-Signing Operation by Fox Tempest
Next Post: Trapdoor Android Fraud Scheme Hijacks 659 Million Daily Requests

Related Posts

Zero-Click Exploit Threatens Google Pixel 10 Security Zero-Click Exploit Threatens Google Pixel 10 Security Cyber Security News
Massive Phishing Attack Impersonate as Travel Brands Attacking Users with 4,300 Malicious Domains Massive Phishing Attack Impersonate as Travel Brands Attacking Users with 4,300 Malicious Domains Cyber Security News
Kawa4096 Ransomware Attacking Multinational Organizations to Exfiltrate Sensitive Data Kawa4096 Ransomware Attacking Multinational Organizations to Exfiltrate Sensitive Data Cyber Security News
Apache Tomcat Vulnerabilities Let Attackers Bypass Authentication & Trigger DoS Attacks Apache Tomcat Vulnerabilities Let Attackers Bypass Authentication & Trigger DoS Attacks Cyber Security News
CISA Warns of Fortinet FortiWeb SQL Injection Vulnerability Exploited in Attacks CISA Warns of Fortinet FortiWeb SQL Injection Vulnerability Exploited in Attacks Cyber Security News
LockBit Operators Using Stealthy DLL Sideloading Technique to Load Malicious App as Legitimate One LockBit Operators Using Stealthy DLL Sideloading Technique to Load Malicious App as Legitimate One Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Trapdoor Android Fraud Scheme Hijacks 659 Million Daily Requests
  • JavaScript and PowerShell Malware Targets Cryptocurrency
  • Microsoft Halts Malware-Signing Operation by Fox Tempest
  • Critical Fixes Issued for PostgreSQL Vulnerabilities
  • Critical Drupal Vulnerability Patch Scheduled for Release

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Trapdoor Android Fraud Scheme Hijacks 659 Million Daily Requests
  • JavaScript and PowerShell Malware Targets Cryptocurrency
  • Microsoft Halts Malware-Signing Operation by Fox Tempest
  • Critical Fixes Issued for PostgreSQL Vulnerabilities
  • Critical Drupal Vulnerability Patch Scheduled for Release

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark