Close Menu
  • Latest News
    • Market
    • Altcoins
    • Legal and Regulatory
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Web3 News
    • NFTs
    • Gaming
  • Learn
    • Education
    • Investments
    • Staking
    • Wallets and Exchanges
  • ICOs
  • Mining
  • Crypto Tools
    • Exchange Tool
  • Shop
What's Hot

Crypto is built for AI agents, not humans, according to Alchemy’s CEO

April 25, 2026

Donald Trump to Speak at Florida Crypto Event on Clarity Act

April 25, 2026

Study Shows Implicity’s New Agnostic Cloud-Based AI Algorithm Further Reduces False Alerts Even After Manufacturer AI Filtering in Modern Devices

April 25, 2026
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
CryptoPulseDaily.com
  • Latest News
    • Market
    • Altcoins
    • Legal and Regulatory
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Web3 News
    • NFTs
    • Gaming
  • Learn
    • Education
    • Investments
    • Staking
    • Wallets and Exchanges
  • ICOs
  • Mining
  • Crypto Tools
    • Exchange Tool
  • Shop
CryptoPulseDaily.com
Home»Security and Privacy»Phemedrone Stealer Targets Windows Defender Flaw Despite Patch
Phemedrone Stealer Targets Windows Defender Flaw Despite Patch
Security and Privacy

Phemedrone Stealer Targets Windows Defender Flaw Despite Patch

January 16, 2024No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

Cybersecurity experts have uncovered the active exploitation of CVE-2023-36025, which also led to the dissemination of a new strain of malware called Phemedrone Stealer. 

This malware explicitly targets web browsers and collects data from cryptocurrency wallets and messaging applications like Telegram, Steam and Discord. 

Additionally, Phemedrone gathers system information, including hardware details and location, sending the stolen data to the attackers through Telegram or their command-and-control (C2) server.

The vulnerability in question impacts Microsoft Windows Defender SmartScreen, resulting from inadequate checks on Internet Shortcut (.url) files. 

Threat actors leverage this loophole by creating .url files that download and execute malicious scripts, bypassing Windows Defender SmartScreen warnings. 

Microsoft addressed this vulnerability on November 14 2023. Still, its exploitation in the wild prompted the Cybersecurity and Infrastructure Security Agency (CISA) to include it in the Known Exploited Vulnerabilities (KEV) list on the same day.

Evidence suggests that since its discovery, various malware campaigns, including those distributing the Phemedrone Stealer payload, have incorporated this vulnerability into their attack chains. The attack vector primarily involves hosting malicious .url files on cloud services like Discord or FileTransfer.io, with attackers using URL shorteners to disguise these files.

Once the malicious .url file exploiting CVE-2023-36025 is executed, the malware employs defense evasion techniques, such as DLL sideloading and dynamic API resolving, to obfuscate its presence. The malware achieves persistence by creating scheduled tasks and utilizes an encrypted second-stage loader.

Read more on CVE-2023-36025 exploitation: BattleRoyal Cluster Signals DarkGate Surge

Second Stage Extraction and Exfiltration

Phemedrone Stealer’s second stage involves an open-source shellcode called Donut, enabling the execution of various file types in memory. The malware dynamically targets a broad range of applications and services. It then extracts sensitive information, including credentials, from browsers, crypto wallets, Discord, FileZilla, Steam and more.

See also  Mastercard Targets Venmo-Style Network for Blockchain Transactions

The malware also employs an elaborate data exfiltration process, compressing and sending the harvested data through the Telegram API. It ensures data integrity by validating the Telegram API token and transmits a detailed system information report to the attackers.

Despite Microsoft issuing a patch for CVE-2023-36025, Trend Micro said threat actors persist in exploiting this vulnerability, emphasizing the need for organizations to update their Windows installations promptly.

“Organizations must make sure to update Microsoft Windows installations to prevent being exposed to the Microsoft Windows Defender SmartScreen Bypass,” reads the advisory.

“Public proof-of-concept exploit code exists on the web increasing the risk to organizations who have not yet updated to the latest patched version.”

Source link

Defender Flaw Patch Phemedrone Stealer Targets Windows
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

For 93 minutes, installing Bitwarden’s ‘official’ CLI turned laptops into launchpads for hijacking GitHub accounts

April 24, 2026

Npm Supply Chain Attack Uses Worm-Like Propagation

April 24, 2026

Bitcoin Price Strengthens, Fresh Upside Targets Come Into View

April 24, 2026

New York targets crypto with new $3.4B fines as perpetual futures turn prediction apps into nonstop leverage casinos

April 23, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Crypto Token Classified as Both Security and Non-Security

February 12, 2024

Orderly Network Partners with Slash Financial to Simplify Web3 Fintech Solutions

December 6, 2023

UK’s ambitions for crypto hub status falter amid regulatory roadblocks

August 31, 2024

Subscribe to Updates

Get the latest creative news From Crypto Daily Pulse directly in your Inbox!

Our mission is to develop a community of people who try to make financially sound decisions. The website strives to educate individuals in making wise choices about Crypto, ICOs, Web3, Blockchain and more.

We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

Crypto is built for AI agents, not humans, according to Alchemy’s CEO

April 25, 2026

Donald Trump to Speak at Florida Crypto Event on Clarity Act

April 25, 2026

Study Shows Implicity’s New Agnostic Cloud-Based AI Algorithm Further Reduces False Alerts Even After Manufacturer AI Filtering in Modern Devices

April 25, 2026
Get Informed

Subscribe to Updates

Get the latest creative news From Crypto Daily Pulse directly in your Inbox!

  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2026 Crypto Pulse Daily - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.

Cleantalk Pixel
  • bitcoinBitcoin(BTC)$77,631.000.24%
  • ethereumEthereum(ETH)$2,319.630.15%
  • tetherTether(USDT)$1.000.00%
  • rippleXRP(XRP)$1.42-0.65%
  • binancecoinBNB(BNB)$629.25-1.15%
  • usd-coinUSDC(USDC)$1.000.00%
  • solanaSolana(SOL)$86.12-0.18%
  • tronTRON(TRX)$0.3244170.22%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.02-0.55%
  • dogecoinDogecoin(DOGE)$0.097951-0.22%