Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Resolve AI, a startup led by former Splunk executives, reaches $1 billion Series A valuation

Establish a venture-backable company in a highly regulated field

Cursor continues acquisition spree with deal with Graphite

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Cracked software and YouTube videos spread CountLoader and GachiLoader malware
Identity

Cracked software and YouTube videos spread CountLoader and GachiLoader malware

userBy userDecember 19, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

CountLoader and GachiLoader malware

Cybersecurity researchers have revealed details of a new campaign that used a cracked software distribution site as a distribution vector for a new version of a modular stealth loader known as CountLoader.

The Cyderes Howler Cell Threat Intelligence team said in its analysis that the campaign “uses CountLoader as the first tool in a multi-stage attack to access, evade, and distribute additional malware families.”

CountLoader has been previously documented by both Fortinet and Silent Push, detailing the loader’s ability to push payloads such as Cobalt Strike, AdaptixC2, PureHVNC RAT, Amatera Stealer, and PureMiner. This loader has been detected in the wild since at least June 2025.

The latest attack chain begins when an unsuspecting user attempts to download a cracked version of legitimate software, such as Microsoft Word, and is redirected to a MediaFire link that hosts a malicious ZIP archive. This archive contains an encrypted ZIP file and a Microsoft Word document with a password to open the second archive.

Inside the ZIP file is a renamed legitimate Python interpreter (‘Setup.exe’). It is configured to run a malicious command that retrieves CountLoader 3.2 from a remote server using ‘mshta.exe’.

cyber security

To establish persistence, the malware creates a scheduled task that mimics Google using the name “GoogleTaskSystem136.0.7023.12” and an identifier-like string. It is configured to run every 30 minutes for 10 years by calling ‘mshta.exe’ on the fallback domain.

It also checks if CrowdStrike’s Falcon security tool is installed on the host by querying the antivirus list via Windows Management Instrumentation (WMI). If the service is detected, the persistence command is adjusted to “cmd.exe /c start /b mshta.exe”. Otherwise, use “mshta.exe” to access the URL directly.

CountLoader is equipped to profile compromised hosts and fetch the next stage payload. The latest version of this malware adds the ability to propagate via removable USB drives and execute the malware directly in memory via ‘mshta.exe’ or PowerShell. Here is the complete list of supported features:

Downloads and runs an executable file from the specified URL Downloads a ZIP archive from the specified URL and runs any Python-based module or EXE file present within it Downloads a DLL from the specified URL and runs it via ‘rundll32.exe’ Downloads and installs an MSI installer package Removes scheduled tasks used by the loader Collects and extracts extensive system information Spreads via removable media by creating a malicious shortcut (LNK) that executes the original file on startup next to its hidden original counterpart Executes malware via ‘mshta.exe’ with C2 parameters Launches ‘mshta.exe’ directly to the provided URL Executes remote PowerShell payload in memory

In the attack chain observed by Cyderes, the final payload deployed by CountLoader is an information stealer known as ACR Stealer, which has the ability to collect sensitive data from infected hosts.

“This campaign highlights the continued evolution and sophistication of CountLoader, reinforcing the need for proactive detection and defense-in-depth strategies,” Cyderes said. “Its ability to deliver ACR Stealer through a multi-step process ranging from modifying Python libraries to unpacking in-memory shellcode highlights the growing trend of signed binary exploitation and fileless execution tactics.”

YouTube Ghost Network presents GachiLoader

This disclosure comes after Check Point revealed details of a new highly obfuscated JavaScript malware loader written in Node.js called GachiLoader. The malware is distributed through the YouTube Ghost network, a network of compromised YouTube accounts involved in distributing the malware.

“One of the GachiLoader variants deploys a second stage of malware, Kidkadi, which implements a new technique for Portable Executable (PE) injection,” said security researchers Sven Rath and Jaromír Hořejší. “This technique loads a legitimate DLL and exploits vector exception handling to replace it with a malicious payload on the fly.”

As many as 100 YouTube videos were reported as part of the campaign, with approximately 220,000 views. These videos were uploaded from 39 compromised accounts, with the first video dating back to December 22, 2024. Most of these videos have since been removed by Google.

cyber security

In at least one case, GachiLoader served as a conduit for the Rhadamanthys information-stealing malware. Like other loaders, GachiLoader is used to deploy additional payloads to infected machines, while running a series of anti-analysis checks to fly under the radar.

Also check if it is running with administrator privileges by running the “net session” command. If execution fails, it attempts to start itself with administrator privileges, which triggers a User Account Control (UAC) prompt. As outlined in the CountLoader case, malware is more likely to be distributed through fake installers of popular software, making it more likely that victims will allow it to continue.

In the final phase, the malware attempts to kill ‘SecHealthUI.exe’, a process associated with Microsoft Defender, and configures Defender exclusions to prevent security solutions from flagging malicious payloads staged in specific folders (C:\Users\, C:\ProgramData\, C:\Windows\).

GachiLoader then either fetches the final payload directly from the remote URL or uses another loader named ‘kidkadi.node’ to load the main malware by exploiting vector exception handling.

“The attackers behind GachiLoader are familiar with the internals of Windows and have devised new variations on known techniques,” Check Point said. “This highlights the need for security researchers to stay up-to-date on malware techniques such as PE injection, and to actively seek new ways for malware authors to try to evade detection.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHacking, theft and destruction: 2025’s worst data breaches
Next Article Known uses voice AI to support more direct dating
user
  • Website

Related Posts

Russian-linked hackers use Microsoft 365 device code phishing to take over accounts

December 19, 2025

WatchGuard warns of active exploitation of critical Fireware OS VPN vulnerability

December 19, 2025

Nigeria arrests RaccoonO365 phishing developer involved in Microsoft 365 attack

December 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Resolve AI, a startup led by former Splunk executives, reaches $1 billion Series A valuation

Establish a venture-backable company in a highly regulated field

Cursor continues acquisition spree with deal with Graphite

Elon Musk’s $56 billion Tesla pay package reinstated by Delaware Supreme Court

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.