Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Multi-Stage Windows Malware Disables Microsoft Defender Before Dropping Malicious Payloads

New Multi-Stage Windows Malware Disables Microsoft Defender Before Dropping Malicious Payloads

Posted on January 22, 2026January 22, 2026 By CWS

Safety researchers have recognized a classy multi-stage malware marketing campaign focusing on Home windows techniques by means of social engineering and weaponized cloud providers.

The assault employs business-themed paperwork as misleading entry factors, luring customers into extracting compressed archives containing malicious shortcuts that execute PowerShell instructions within the background.

As soon as initiated, the an infection chain systematically neutralizes Microsoft Defender earlier than delivering harmful payloads together with ransomware, surveillance instruments, and banking trojans.

The marketing campaign represents a regarding evolution in assault sophistication, as risk actors keep away from exploiting software program vulnerabilities totally.

As a substitute, the assault depends on abuse of respectable working system performance, native administrative instruments, and public cloud platforms resembling GitHub and Dropbox to stay hidden inside regular enterprise site visitors patterns.

This strategy dramatically reduces the chance of signature-based detection whereas amplifying impression by means of sustained, multi-layered compromise.

The an infection begins with a misleading LNK shortcut file disguised as a normal accounting doc. When executed, this file launches PowerShell utilizing an execution coverage bypass, downloading an obfuscated first-stage loader script from GitHub.

Assault chain (Supply – Fortinet)

The loader establishes persistence, generates decoy paperwork to distract customers, and initiates communication with the attacker by way of the Telegram Bot API to verify profitable compromise.

Fortinet analysts recognized the malware after discovering the subtle defense-evasion mechanisms embedded all through the assault chain.

A vital part of this marketing campaign is the operational abuse of Defendnot, a analysis software initially designed to display Home windows Safety Middle vulnerabilities.

An infection Vector

Risk actors repurposed this software to systematically disable Microsoft Defender by registering a pretend antivirus product, exploiting Home windows belief assumptions to pressure Defender’s computerized shutdown.

Telegram notification and secondary script deployment (Supply – Fortinet)

The assault progresses by means of 4 distinct operational phases. Following defensive neutralization, the marketing campaign transitions into surroundings reconnaissance and energetic surveillance, deploying screenshot seize modules that exfiltrate visible proof of consumer exercise.

The attacker then implements complete system lockdown, disabling administrative instruments, destroying restoration mechanisms, and hijacking file associations to forestall victims from executing respectable purposes or accessing their very own recordsdata.

Administrative privilege verification and UAC escalation logic (Supply – Fortinet)

Lastly, the marketing campaign deploys Amnesia RAT for persistent distant entry and knowledge theft, focusing on browser credentials, cryptocurrency wallets, and delicate monetary data.

WinLocker interface imposing system lockout (Supply – Fortinet)

Parallel deployment of Hakuna Matata ransomware encrypts consumer recordsdata with the extension NeverMind12F whereas WinLocker elements implement full system lockout, displaying countdown timers that stress victims into contacting the attacker for ransom negotiation.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Defender, Disables, Dropping, Malicious, Malware, Microsoft, MultiStage, Payloads, Windows

Post navigation

Previous Post: BIND 9 Vulnerability Allow Attackers to Crash Server by Sending Malicious Records
Next Post: Furl Raises $10 Million for Autonomous Vulnerability Remediation

Related Posts

New SEO Poisoning Attacking Windows Users With Weaponized Software Sites New SEO Poisoning Attacking Windows Users With Weaponized Software Sites Cyber Security News
New Cryptojacking Attack Exploits Redis Servers to Install Miners and Disable Defenses New Cryptojacking Attack Exploits Redis Servers to Install Miners and Disable Defenses Cyber Security News
Dual Malware Campaign Deploys Gh0st RAT and Adware Dual Malware Campaign Deploys Gh0st RAT and Adware Cyber Security News
Cisco Small Business Switches Face Global DNS Crash Outage Cisco Small Business Switches Face Global DNS Crash Outage Cyber Security News
Microsoft 365 Faces Chrome Compatibility Issues Microsoft 365 Faces Chrome Compatibility Issues Cyber Security News
PoisonSeed Phishing Kit Bypasses MFA to Acquire Credentials from Individuals and Organizations PoisonSeed Phishing Kit Bypasses MFA to Acquire Credentials from Individuals and Organizations Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark