Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Pebble smartwatch is back: Pebble Time 2 specifications revealed

Humanity’s nabs Humanloop team as a competition for enterprise AI talents gets hot

New PS1bot malware campaign deploys in-memory attacks in multistage using Malvertisingising

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New PS1bot malware campaign deploys in-memory attacks in multistage using Malvertisingising
Identity

New PS1bot malware campaign deploys in-memory attacks in multistage using Malvertisingising

userBy userAugust 13, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 13, 2025Ravi LakshmananAggravated / Cryptocurrency

Cybersecurity researchers have discovered a new Malvertising campaign designed to infect victims with a multi-stage malware framework called PS1BOT.

“The PS1bot has a modular design, and several modules are delivered and used to perform a variety of malicious activities on infected systems, including information theft, key logs, reconnaissance, and establishment of permanent system access.”

“The PS1bot is designed with stealth in mind, minimizing persistent artifacts remaining on infected systems, and incorporates in-memory execution technology to facilitate the execution of subsequent modules without requiring them to be written to disk.”

The campaign to distribute PowerShell and C# malware has been known to be active since early 2025, leveraging fraud as a propagation vector, and the infection chain runs modules in memory to minimize forensic trails. PS1BOT is evaluated to share technical overlap with AHK bots, an automatic hotkey-based malware previously used by threat actor Asylum Ambuscade and TA866.

Cybersecurity

Additionally, activity clusters have been identified as overlapping with previous ransom-related campaigns using malware named SkitNet (aka BossNet) with the aim of stealing data and establishing remote control for compromised hosts.

The starting point for the attack is a compressed archive delivered to victims via fraud or search engine optimization (SEO) addiction. What resides in the zip file is a JavaScript payload that acts as a downloader for obtaining scriptlets from an external server that writes and runs a PowerShell script to a file on disk.

The PowerShell script is responsible for contacting the Command and Control (C2) server and getting the next stage PowerShell command that allows the operator to augment the malware’s functionality with modular fashion and allow the operator to perform a wide range of actions on the compromised host –

Antivirus detection, which retrieves and reports a list of antivirus programs present in the screen capture of an infected system, captures a screenshot of an infected system and sends the resulting image to a C2 server wallet grabber. Keystrokes and Collect Clipboard Content Information Collection harvests and sends information about infected systems and environments to the attacker’s persistence. This creates a PowerShell script, which automatically starts up on restart, and incorporates the same logic used to fetch modules with the same logic used to establish the C2 polling process.

“The implementation of the Information Steeler Module utilizes the word list embedded in the Steeler to enumerate the passwords and seed phrases that can be used to access the cryptocurrency wallet.

Identity Security Risk Assessment

“The modularity of this malware implementation provides flexibility and allows for rapid deployment of updates or new features as needed.”

This disclosure comes when Google says it leverages artificial intelligence (AI) systems powered by a large language model (LLM) to combat invalid traffic (IVT) and identifies ad placements that produce invalid behavior more accurately.

“Our new applications provide faster and stronger protection by analyzing apps and web content, ad placement and user interaction,” Google said. “For example, we have significantly improved our content review capabilities, leading to a 40% reduction in IVT due to deceptive or destructive advertising services.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTony Robbins and Peter Diamandis’s Longevity Company Fountain Living Raising $18 million
Next Article Humanity’s nabs Humanloop team as a competition for enterprise AI talents gets hot
user
  • Website

Related Posts

Zoom and Xerox releases critical security update fix privilege escalation and RCE flaws

August 13, 2025

Fortinet warns about Fortisiem vulnerability (CVE-2025-25256) in the Wild in the Wild Exploit Code

August 13, 2025

Important features that security leaders need to know

August 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Pebble smartwatch is back: Pebble Time 2 specifications revealed

Humanity’s nabs Humanloop team as a competition for enterprise AI talents gets hot

New PS1bot malware campaign deploys in-memory attacks in multistage using Malvertisingising

Tony Robbins and Peter Diamandis’s Longevity Company Fountain Living Raising $18 million

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

The AI-Powered Career Path: How TwinH by FySelf Evolves Your Digital Professional Identity

Web 3.0 Gets Personal: FySelf’s TwinH Paves the Way for User-Controlled Digital Identity

Google’s Genie 3: The Dawn of General AI?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.