Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Multi-Stage Windows Malware Disables Microsoft Defender Before Dropping Malicious Payloads

New Multi-Stage Windows Malware Disables Microsoft Defender Before Dropping Malicious Payloads

Posted on January 22, 2026January 22, 2026 By CWS

Safety researchers have recognized a classy multi-stage malware marketing campaign focusing on Home windows techniques by means of social engineering and weaponized cloud providers.

The assault employs business-themed paperwork as misleading entry factors, luring customers into extracting compressed archives containing malicious shortcuts that execute PowerShell instructions within the background.

As soon as initiated, the an infection chain systematically neutralizes Microsoft Defender earlier than delivering harmful payloads together with ransomware, surveillance instruments, and banking trojans.

The marketing campaign represents a regarding evolution in assault sophistication, as risk actors keep away from exploiting software program vulnerabilities totally.

As a substitute, the assault depends on abuse of respectable working system performance, native administrative instruments, and public cloud platforms resembling GitHub and Dropbox to stay hidden inside regular enterprise site visitors patterns.

This strategy dramatically reduces the chance of signature-based detection whereas amplifying impression by means of sustained, multi-layered compromise.

The an infection begins with a misleading LNK shortcut file disguised as a normal accounting doc. When executed, this file launches PowerShell utilizing an execution coverage bypass, downloading an obfuscated first-stage loader script from GitHub.

Assault chain (Supply – Fortinet)

The loader establishes persistence, generates decoy paperwork to distract customers, and initiates communication with the attacker by way of the Telegram Bot API to verify profitable compromise.

Fortinet analysts recognized the malware after discovering the subtle defense-evasion mechanisms embedded all through the assault chain.

A vital part of this marketing campaign is the operational abuse of Defendnot, a analysis software initially designed to display Home windows Safety Middle vulnerabilities.

An infection Vector

Risk actors repurposed this software to systematically disable Microsoft Defender by registering a pretend antivirus product, exploiting Home windows belief assumptions to pressure Defender’s computerized shutdown.

Telegram notification and secondary script deployment (Supply – Fortinet)

The assault progresses by means of 4 distinct operational phases. Following defensive neutralization, the marketing campaign transitions into surroundings reconnaissance and energetic surveillance, deploying screenshot seize modules that exfiltrate visible proof of consumer exercise.

The attacker then implements complete system lockdown, disabling administrative instruments, destroying restoration mechanisms, and hijacking file associations to forestall victims from executing respectable purposes or accessing their very own recordsdata.

Administrative privilege verification and UAC escalation logic (Supply – Fortinet)

Lastly, the marketing campaign deploys Amnesia RAT for persistent distant entry and knowledge theft, focusing on browser credentials, cryptocurrency wallets, and delicate monetary data.

WinLocker interface imposing system lockout (Supply – Fortinet)

Parallel deployment of Hakuna Matata ransomware encrypts consumer recordsdata with the extension NeverMind12F whereas WinLocker elements implement full system lockout, displaying countdown timers that stress victims into contacting the attacker for ransom negotiation.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Defender, Disables, Dropping, Malicious, Malware, Microsoft, MultiStage, Payloads, Windows

Post navigation

Previous Post: BIND 9 Vulnerability Allow Attackers to Crash Server by Sending Malicious Records
Next Post: Furl Raises $10 Million for Autonomous Vulnerability Remediation

Related Posts

Printer Company Offered Malicious Drivers Infected With XRed Malware Printer Company Offered Malicious Drivers Infected With XRed Malware Cyber Security News
VMware Workstation and Fusion 25H2 Released with New Features and Latest OS Support VMware Workstation and Fusion 25H2 Released with New Features and Latest OS Support Cyber Security News
Achieving Continuous Compliance in Dynamic Threat Environments Achieving Continuous Compliance in Dynamic Threat Environments Cyber Security News
RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers Cyber Security News
New Wave of Crypto-Hijacking Infects 3,500+ Websites New Wave of Crypto-Hijacking Infects 3,500+ Websites Cyber Security News
Hackers Exploit Google Calendar for AI Security Breach Hackers Exploit Google Calendar for AI Security Breach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News