Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Threat Actors Impersonate as MalwareBytes to Attack Users and Steal Logins

Threat Actors Impersonate as MalwareBytes to Attack Users and Steal Logins

Posted on January 19, 2026January 19, 2026 By CWS

A brand new malware marketing campaign has emerged that tips folks into downloading pretend Malwarebytes software program, placing their login credentials and cryptocurrency wallets at critical threat.

Safety researchers found this operation actively spreading between January 11 and January 15, 2026, utilizing specifically crafted ZIP recordsdata that impersonate official Malwarebytes installers.

The pretend recordsdata are named malwarebytes-windows-github-io-X.X.X.zip, making them seem genuine to unsuspecting customers who consider they’re downloading real antivirus safety.

The marketing campaign’s major aim facilities on delivering an information-stealing malware that harvests delicate consumer information.

Content material of the TXT file (Supply – VirusTotal)

These malicious ZIP archives include a harmful mixture of recordsdata designed to bypass safety defenses and set up persistence on contaminated programs.

When customers extract and run what seems to be the official Malwarebytes executable, they unknowingly set off a series of malicious occasions that finally compromises their digital safety and private data.

VirusTotal analysts recognized the malware after analyzing the an infection patterns and file constructions, noting that every one suspicious ZIP archives share a constant identifier often called a behash worth of “4acaac53c8340a8c236c91e68244e6cb.”

This technical marker grew to become essential in monitoring the marketing campaign’s scope and figuring out extra variants used within the operation.

The researchers documented how the malware operates via a complicated layering approach that makes detection and evaluation tougher.

DLL Sideloading: The Assault Mechanism

The assault depends on a misleading approach referred to as DLL sideloading, which exploits how Home windows masses official software program libraries. The malicious payload is hidden inside a file named CoreMessaging.dll.

The recognized DLLs (Supply – VirusTotal)

When the official Malwarebytes executable runs, the working system masses this malicious DLL as an alternative of the real library file.

Risk actors place each the pretend DLL and bonafide EXE in the identical folder, tricking Home windows into executing the malware with out elevating suspicion.

The malicious DLLs function distinctive metadata together with signature strings like “© 2026 Eosinophil LLC” and strange exported capabilities containing alphanumeric sequences resembling “15Mmm95ml1RbfjH1VUyelYFCf” and “2dlSKEtPzvo1mHDN4FYgv.”

These traits enable safety researchers to hunt for associated samples and observe the broader marketing campaign.

As soon as the malicious DLL executes, it drops secondary-stage infostealers that particularly goal cryptocurrency pockets data and saved browser credentials, enabling attackers to commit identification theft and cryptocurrency theft.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Actors, Attack, Impersonate, Logins, Malwarebytes, Steal, Threat, Users

Post navigation

Previous Post: Attackers are Using WSL2 as a Stealthy Hideout Inside Windows Systems
Next Post: Inside the Leaks that Exposed the Hidden Infrastructure Behind a Ransomware Operation

Related Posts

Lightship Security and OpenSSL Submit Version 3.5.4 for FIPS 140-3 Validation Lightship Security and OpenSSL Submit Version 3.5.4 for FIPS 140-3 Validation Cyber Security News
TOTOLINK X6000R Router Vulnerabilities Let Remote Attackers Execute Arbitrary Commands TOTOLINK X6000R Router Vulnerabilities Let Remote Attackers Execute Arbitrary Commands Cyber Security News
Insider Threats in 2025 Detection and Prevention Strategies Insider Threats in 2025 Detection and Prevention Strategies Cyber Security News
SSHStalker Botnet Exploits Weak Passwords to Target Linux Servers SSHStalker Botnet Exploits Weak Passwords to Target Linux Servers Cyber Security News
Cybersecurity Professionals Charged for Deploying ALPHV BlackCat Ransomware Against US Companies Cybersecurity Professionals Charged for Deploying ALPHV BlackCat Ransomware Against US Companies Cyber Security News
New Spear Phishing Attack Leveraging Argentine Federal Court Rulings to Covert RAT for Remote Access New Spear Phishing Attack Leveraging Argentine Federal Court Rulings to Covert RAT for Remote Access Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News