Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Snake Keylogger Evades Windows Defender and Scheduled Tasks to Harvest Login Credentials

Snake Keylogger Evades Windows Defender and Scheduled Tasks to Harvest Login Credentials

Posted on July 19, 2025July 19, 2025 By CWS

A complicated phishing marketing campaign focusing on Turkish protection and aerospace enterprises has emerged, delivering a extremely evasive variant of the Snake Keylogger malware by means of fraudulent emails impersonating TUSAŞ (Turkish Aerospace Industries).

The malicious marketing campaign distributes recordsdata disguised as contractual paperwork, particularly utilizing the filename “TEKLİF İSTEĞİ – TUSAŞ TÜRK HAVACILIK UZAY SANAYİİ_xlsx.exe” to deceive recipients into executing the payload.

The Snake Keylogger variant demonstrates superior persistence capabilities and complex evasion strategies that permit it to function undetected inside compromised programs.

As soon as executed, the malware instantly establishes a number of layers of persistence whereas concurrently implementing anti-detection mechanisms to make sure long-term entry to sufferer programs.

The marketing campaign’s focused strategy towards protection business contractors signifies a strategic give attention to high-value intelligence gathering operations.

Malwation researchers recognized this specific pressure throughout their evaluation of current phishing campaigns, noting the malware’s subtle use of official Home windows utilities to take care of persistence and evade safety controls.

Menace.Zone (Supply – Malwation)

The pattern, with SHA256 hash 0cb819d32cb3a2f218c5a17c02bb8c06935e926ebacf1e40a746b01e960c68e4, presents as a PE32 executable written in .NET, using a number of unpacking layers to hide its true performance.

The keylogger’s major targets embody credentials, cookies, and monetary info extracted from over 30 totally different browsers and electronic mail purchasers, together with Chrome, Firefox, Outlook, and Thunderbird.

Snake Keylogger Functionalities (Supply – Malwation)

Moreover, the malware harvests autofill knowledge, bank card info, obtain histories, and prime websites from compromised programs earlier than exfiltrating the stolen knowledge by way of SMTP to mail.htcp.properties servers.

Superior Persistence and Evasion Mechanisms

The malware employs a dual-pronged strategy to determine persistence whereas evading detection programs.

Upon execution, it instantly invokes PowerShell so as to add itself to Home windows Defender’s exclusion checklist utilizing the command Add-MpPreference -Excl, successfully neutralizing the built-in antimalware safety.

This operation is executed by means of the NtCreateUserProcess system name, launching powershell.exe with elevated privileges to change safety configurations.

Concurrently, the malware creates a scheduled process named “UpdatesoNqxPR” utilizing schtasks.exe to make sure automated execution at system startup.

The scheduled process creation course of includes producing an XML configuration file that defines the execution parameters, permitting the malware to persist throughout system reboots with out consumer interplay.

This method leverages official Home windows process scheduling performance, making detection considerably tougher for conventional safety options.

Enhance detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now

Cyber Security News Tags:Credentials, Defender, Evades, Harvest, Keylogger, Login, Scheduled, Snake, Tasks, Windows

Post navigation

Previous Post: Chinese Threat Actors Using 2,800 Malicious Domains to Deliver Windows-Specific Malware
Next Post: How to Protect Business Data on Employee Devices

Related Posts

New tool to Remove Copilot, Recall and Other AI tools From Windows 11 New tool to Remove Copilot, Recall and Other AI tools From Windows 11 Cyber Security News
NoName057(16)’s Hackers Attacked 3,700 Unique Devices Over Last Thirteen Months NoName057(16)’s Hackers Attacked 3,700 Unique Devices Over Last Thirteen Months Cyber Security News
Microsoft Teams’ New “Chat with Anyone” Feature Exposes Users to Phishing and Malware Attacks Microsoft Teams’ New “Chat with Anyone” Feature Exposes Users to Phishing and Malware Attacks Cyber Security News
Hackers Can Inject Malicious Code into Antivirus Processes to Create a Backdoor Hackers Can Inject Malicious Code into Antivirus Processes to Create a Backdoor Cyber Security News
New Forensic Technique Uncovers Hidden Trails Left by Hackers Exploiting RDP New Forensic Technique Uncovers Hidden Trails Left by Hackers Exploiting RDP Cyber Security News
Crimson Collective Claims to have Disconnected Many Brightspeed Home Internet Users Crimson Collective Claims to have Disconnected Many Brightspeed Home Internet Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News