BTC $64149.5708
ETH $3312.1965
BNB $600.6575
SOL $143.8853
stETH $3305.8730
XRP $0.5227
DOGE $0.1500
TON $5.4940
ADA $0.4750
AVAX $35.0149
wstETH $3857.0166
TRX $0.1205
WETH $3309.9126
WBTC $64222.3874
DOT $6.9214
BCH $484.6556
LINK $14.3469
MATIC $0.7461
UNI $8.0826
ICP $13.6171
LTC $84.7528
DAI $1.0009
CAKE $2.7885
RNDR $8.3118
NEAR $7.3072
FDUSD $1.0006
IMX $2.1680
ETC $28.5747
HBAR $0.1073
STX $2.5842
MNT $1.0980
FIL $6.0205
OKB $53.4346
PEPE $0.0000
VET $0.0401
TAO $432.4403
MKR $3016.5418
WIF $2.7932
ATOM $8.4776
KAS $0.1106
GRT $0.2715
FET $2.2482
INJ $26.3991
USDE $0.9994
THETA $2.3440
XLM $0.1153
AR $35.3884
BTC $64149.5708
ETH $3312.1965
BNB $600.6575
SOL $143.8853
stETH $3305.8730
XRP $0.5227
DOGE $0.1500
TON $5.4940
ADA $0.4750
AVAX $35.0149
wstETH $3857.0166
TRX $0.1205
WETH $3309.9126
WBTC $64222.3874
DOT $6.9214
BCH $484.6556
LINK $14.3469
MATIC $0.7461
UNI $8.0826
ICP $13.6171
LTC $84.7528
DAI $1.0009
CAKE $2.7885
RNDR $8.3118
NEAR $7.3072
FDUSD $1.0006
IMX $2.1680
ETC $28.5747
HBAR $0.1073
STX $2.5842
MNT $1.0980
FIL $6.0205
OKB $53.4346
PEPE $0.0000
VET $0.0401
TAO $432.4403
MKR $3016.5418
WIF $2.7932
ATOM $8.4776
KAS $0.1106
GRT $0.2715
FET $2.2482
INJ $26.3991
USDE $0.9994
THETA $2.3440
XLM $0.1153
AR $35.3884
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Elusive PowerShell backdoor masquerades as a Windows update


    A previously unmentioned backdoor was discovered by experts from SafeBreach. The malware is extremely stealthy, as it masquerades as a Windows update process.

    According to Tomer Bahr, head of the research team at SafeBreach, behind the stealthy malware and its C&C infrastructure is an extremely well-prepared group that has already attacked about 100 victims.

    The chain of attacks by an unknown group begins with a Word document (VirusTotal), which was uploaded to the network from Jordan on August 25, 2022. The document's metadata suggests that the hackers are primarily targeting LinkedIn users.

    If the victim opens the document, the PowerShell script (Script1.ps1) will be executed on their computer using the macro code embedded in the file.

    The PowerShell script is needed to connect to the C&C server and receive commands that will be run by the second script (temp.ps1).

    However, the hackers made a mistake in their script, with the help of which the researchers were able to reconstruct the commands sent by the server. These included commands to run whoami, list files in specific folders, retrieve a list of running processes, and remove files from users' shared folders.

    Author DeepWeb
    Vicodin. Medicine or poison?
    Trojan clicker from Google Play has been installed more than 20 million times

    Comments 0

    Add comment