Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Sidewinder Hacker Group Weaponizing LNK File to Execute Malicious Scripts

Sidewinder Hacker Group Weaponizing LNK File to Execute Malicious Scripts

Posted on September 12, 2025September 12, 2025 By CWS

The infamous APT-C-24 menace actor group, generally referred to as Sidewinder or Rattlesnake, has advanced its assault methodology by deploying refined LNK file-based phishing campaigns focusing on authorities, power, navy, and mining sectors throughout South Asia.

Lively since 2012, this superior persistent menace group has shifted away from its conventional exploitation of Microsoft Workplace vulnerabilities, as a substitute embracing a extra stealthy strategy utilizing weaponized shortcut recordsdata to execute distant malicious scripts.

Current assault samples found by safety researchers reveal a fastidiously orchestrated marketing campaign the place victims obtain compressed archives containing three malicious LNK recordsdata, every designed with twin extensions resembling “file 1.docx.lnk,” “file 2.docx.lnk,” and “file 3.docx.lnk.”

These misleading filenames are strategically crafted to seem as legit doc recordsdata, exploiting person belief and rising the probability of execution.

The attackers have refined their supply mechanism to maximise an infection chance by offering a number of entry factors inside a single bundle.

Ctfiot analysts recognized that these LNK recordsdata leverage the Microsoft HTML Utility Host (MSHTA) program to execute malicious scripts hosted on distant command-and-control servers.

The distant URLs exhibit a particular sample, terminating with parameters “yui=0,” “yui=1,” and “yui=2,” serving as distinctive identifiers for every variant whereas sustaining purposeful similarity throughout all three recordsdata.

Assault Course of (Supply – Ctfiot)

The assault methodology demonstrates refined environmental consciousness capabilities, with the malicious scripts performing complete system reconnaissance earlier than continuing with payload deployment.

Upon execution, the preliminary JavaScript element conducts anti-analysis checks by querying system specs by means of Home windows Administration Instrumentation (WMI), particularly analyzing processor core counts and bodily reminiscence allocation to tell apart between real goal environments and safety analysis sandboxes.

Superior Evasion and Payload Deployment Mechanisms

The group’s technical sophistication turns into evident of their multi-layered obfuscation methods and conditional payload supply system.

The preliminary HTML utility performs twin performance by concurrently deploying decoy content material to keep up sufferer deception whereas establishing persistence by means of memory-resident assault parts.

The malicious script queries processor cores utilizing “SELECT NumberOfCores FROM Win32_Processor” and requires a minimal of two cores alongside 810MB of bodily reminiscence earlier than continuing with payload decryption.

As soon as environmental checks go validation, the script employs Base64 decoding mixed with XOR encryption to decrypt and reflectively load a closely obfuscated C# downloader element.

This refined payload performs safety software program detection, scanning for processes related to Kaspersky, ESET, and different endpoint safety options earlier than establishing communication with command-and-control infrastructure.

The attackers exhibit operational safety consciousness by quickly rotating compromised domains and selectively delivering superior payloads solely to victims assembly particular focusing on standards, considerably complicating safety analysis efforts and menace searching actions.

Enhance your SOC and assist your crew defend your small business with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Execute, File, Group, Hacker, LNK, Malicious, Scripts, SideWinder, Weaponizing

Post navigation

Previous Post: AI-powered Pentesting Tool ‘Villager’ Combines Kali Linux Tools with DeepSeek AI for Automated Attacks
Next Post: How to Use Threat Intelligence Feeds

Related Posts

SentinelOne Global Service Outage Root Cause Revealed SentinelOne Global Service Outage Root Cause Revealed Cyber Security News
SSHStalker Botnet Exploits Weak Passwords to Target Linux Servers SSHStalker Botnet Exploits Weak Passwords to Target Linux Servers Cyber Security News
Chinese Hackers Using ToolShell Vulnerability To Compromise Networks Of Government Agencies Chinese Hackers Using ToolShell Vulnerability To Compromise Networks Of Government Agencies Cyber Security News
“PupkinStealer” A New .NET-Based Malware Steals Browser Credentials & Exfiltrate via Telegram “PupkinStealer” A New .NET-Based Malware Steals Browser Credentials & Exfiltrate via Telegram Cyber Security News
New Osiris Ransomware Using Wide Range of Living off the Land and Dual-use Tools in Attacks New Osiris Ransomware Using Wide Range of Living off the Land and Dual-use Tools in Attacks Cyber Security News
‘SyncFuture’ Campaign Weaponizing Legitimate Enterprise Security Software to Deploy Malware ‘SyncFuture’ Campaign Weaponizing Legitimate Enterprise Security Software to Deploy Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News