EmEditor Supply Chain Attack: Trusted Installer Weaponized to Deploy Multi-Stage Malware

EmEditor Supply Chain Attack: Trusted Installer Weaponized to Deploy Multi-Stage Malware

Summary

Attackers compromised the official download page of EmEditor, a popular text and code editor, to distribute a trojanized installer containing multi-stage malware. The attack targeted the software's primarily Japanese developer user base during the late December 2025 holiday period when security monitoring typically weakens.

The malware performs credential theft, system reconnaissance, and data exfiltration while employing sophisticated evasion techniques including ETW disabling and anti-virtualization checks.


Attack Overview

In late December 2025, Emurasoft disclosed that their official EmEditor download page had been compromised. Attackers modified the legitimate Microsoft Installer (.MSI) file to execute malicious PowerShell commands upon installation.

The compromised installer retrieves first-stage code from a spoofed domain (EmEditorjp[.]com), which then connects to additional URLs to download the primary payloads. Geofencing behavior in the malware suggests Russian or CIS-origin threat actors, though attribution remains unconfirmed.


Technical Analysis

Initial Infection Vector

The attackers modified the CustomAction script within the MSI installer to execute an obfuscated PowerShell command. The malware uses string manipulation methods (Insert, Remove, Replace, Substring, Trim) for obfuscation across all payload stages.

Payload 1: Anti-Security & Credential Theft

  • Disables PowerShell Event Tracing for Windows (ETW)
  • Harvests credentials from Windows Credential Manager
  • Detects running security software processes
  • Implements anti-VM/anti-sandbox evasion
  • Captures screenshots for reconnaissance

Payload 2: Persistence & Exfiltration

  • Performs system fingerprinting and hardware enumeration
  • Scans registry for security applications
  • Implements geofencing (blocks execution in Armenia, Belarus, Georgia, Kazakhstan, Kyrgyzstan)
  • Establishes C2 communication with cachingdrive[.]com
  • Exfiltrates collected data with campaign identifier "2daef8cd"

Indicators of Compromise

TypeValue
Malicious DomainEmEditorjp[.]com
C2 Servercachingdrive[.]com
Campaign ID2daef8cd

Defensive Recommendations

Installer Verification: Validate digital signatures on all installers before execution, even from official vendor sources.

PowerShell Governance: Implement strict logging and monitoring for obfuscated scripts and network-enabled commands.

ETW Monitoring: Alert on attempts to disable Event Tracing for Windows, a key indicator of defense evasion.

Credential Hygiene: Apply least-privilege principles to limit lateral movement opportunities post-compromise.

Telemetry Protection: Monitor for attempts to disable logging mechanisms across endpoints.


Key Takeaway

This incident demonstrates that official vendor download channels are not inherently trustworthy. Organizations must treat all third-party software, regardless of source, as a potential attack vector and implement verification controls accordingly.

Read more

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

Elastic Security Labs has disclosed a new ClickFix campaign that leverages compromised legitimate websites as delivery infrastructure to deploy a previously undocumented remote access trojan dubbed MIMICRAT (also tracked as AstarionRAT). The campaign, discovered earlier this month, demonstrates significant operational sophistication — from multi-stage PowerShell chains that bypass Windows security controls

By Zero Day Wire
ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

A new wave of attacks is combining voice phishing (vishing) with OAuth 2.0 device authorization abuse to compromise Microsoft Entra accounts at technology, manufacturing, and financial organizations — bypassing traditional phishing infrastructure entirely. Sources told BleepingComputer they believe the ShinyHunters extortion gang is behind the campaigns, which the threat actors

By Zero Day Wire