EmEditor Supply Chain Attack: Trusted Installer Weaponized to Deploy Multi-Stage Malware

EmEditor Supply Chain Attack: Trusted Installer Weaponized to Deploy Multi-Stage Malware

Summary

Attackers compromised the official download page of EmEditor, a popular text and code editor, to distribute a trojanized installer containing multi-stage malware. The attack targeted the software's primarily Japanese developer user base during the late December 2025 holiday period when security monitoring typically weakens.

The malware performs credential theft, system reconnaissance, and data exfiltration while employing sophisticated evasion techniques including ETW disabling and anti-virtualization checks.


Attack Overview

In late December 2025, Emurasoft disclosed that their official EmEditor download page had been compromised. Attackers modified the legitimate Microsoft Installer (.MSI) file to execute malicious PowerShell commands upon installation.

The compromised installer retrieves first-stage code from a spoofed domain (EmEditorjp[.]com), which then connects to additional URLs to download the primary payloads. Geofencing behavior in the malware suggests Russian or CIS-origin threat actors, though attribution remains unconfirmed.


Technical Analysis

Initial Infection Vector

The attackers modified the CustomAction script within the MSI installer to execute an obfuscated PowerShell command. The malware uses string manipulation methods (Insert, Remove, Replace, Substring, Trim) for obfuscation across all payload stages.

Payload 1: Anti-Security & Credential Theft

  • Disables PowerShell Event Tracing for Windows (ETW)
  • Harvests credentials from Windows Credential Manager
  • Detects running security software processes
  • Implements anti-VM/anti-sandbox evasion
  • Captures screenshots for reconnaissance

Payload 2: Persistence & Exfiltration

  • Performs system fingerprinting and hardware enumeration
  • Scans registry for security applications
  • Implements geofencing (blocks execution in Armenia, Belarus, Georgia, Kazakhstan, Kyrgyzstan)
  • Establishes C2 communication with cachingdrive[.]com
  • Exfiltrates collected data with campaign identifier "2daef8cd"

Indicators of Compromise

TypeValue
Malicious DomainEmEditorjp[.]com
C2 Servercachingdrive[.]com
Campaign ID2daef8cd

Defensive Recommendations

Installer Verification: Validate digital signatures on all installers before execution, even from official vendor sources.

PowerShell Governance: Implement strict logging and monitoring for obfuscated scripts and network-enabled commands.

ETW Monitoring: Alert on attempts to disable Event Tracing for Windows, a key indicator of defense evasion.

Credential Hygiene: Apply least-privilege principles to limit lateral movement opportunities post-compromise.

Telemetry Protection: Monitor for attempts to disable logging mechanisms across endpoints.


Key Takeaway

This incident demonstrates that official vendor download channels are not inherently trustworthy. Organizations must treat all third-party software, regardless of source, as a potential attack vector and implement verification controls accordingly.

Read more