Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
AiTM Phishing Attacks Target SharePoint, HubSpot, Google
May 2, 2026
Attackers Abuse AppSheet, Netlify, Telegram for Google Facebook
May 2, 2026
Home/Threats/Threat Actors Use LNK Files to Deploy Moon Weaponizes MoonPeak
Threats

Threat Actors Use LNK Files to Deploy Moon Weaponizes MoonPeak

A new malware campaign is actively deploying MoonPeak, a dangerous remote access trojan, against Windows users. This campaign leverages deceptive LNK shortcut files for distribution. This malware,...

Emy Elsamnoudy
Emy Elsamnoudy
January 23, 2026 3 Min Read
0 0

A new malware campaign is actively deploying MoonPeak, a dangerous remote access trojan, against Windows users. This campaign leverages deceptive LNK shortcut files for distribution.

This malware, which appears to be a variant of XenoRAT, has been linked to threat actors affiliated with North Korea.

The attack primarily targets South Korean investors and cryptocurrency traders through weaponized files disguised as legitimate PDF documents related to trading strategies.

When victims open the malicious LNK file, it triggers a sophisticated infection chain that deploys the malware while displaying a decoy PDF to avoid suspicion.

The campaign was first detected in January 2026, with LNK files containing Korean filenames suggesting investment-related content.

These files embed an XOR-encoded PDF that opens normally when clicked, making the attack appear harmless to unsuspecting users.

Behind the scenes, however, an obfuscated PowerShell script executes silently in a hidden window.

This script initiates multiple stages of payload delivery, establishing persistence on the infected system and communicating with remote servers controlled by the attackers.

IIJ Security Diary analysts identified this threat through detailed malware analysis, uncovering the complete infection flow that had not been fully documented in earlier reports.

Malicious PowerShell script created in the temporary folder (Source - IIJ Security Diary)
Malicious PowerShell script created in the temporary folder (Source – IIJ Security Diary)

The researchers traced the attack infrastructure to GitHub repositories used for hosting malicious payloads, demonstrating the threat actors’ use of legitimate platforms to evade detection.

Malicious VBScript created in the temporary folder (Source - IIJ Security Diary)
Malicious VBScript created in the temporary folder (Source – IIJ Security Diary)

This technique, known as Living Off Trusted Sites (LOTS), allows attackers to bypass security measures that typically block suspicious domains.

Multi-Stage Infection Mechanism and Evasion Tactics

The MoonPeak infection process operates through three distinct stages, each designed to evade security analysis and establish persistent access.

In the first stage, the LNK file checks for security tools and virtual environments by scanning for specific running processes such as IDA Pro, Wireshark, OllyDbg, and various sandbox indicators.

If any analysis tools are detected, the script immediately terminates to prevent researchers from studying its behavior. This anti-analysis technique ensures the malware only executes on genuine victim systems.

Once the environment check passes, the PowerShell script creates randomly named folders and files in the temporary directory, downloading additional scripts from remote servers.

The task that will be created for automatic execution (Source - IIJ Security Diary)
The task that will be created for automatic execution (Source – IIJ Security Diary)

A scheduled task is then created to ensure the malware runs automatically, even after system reboots.

The second stage involves retrieving a GZIP-compressed payload from a GitHub repository, which is decompressed and loaded directly into memory without touching the disk.

Malicious GitHub repository created by a threat actor (Source - IIJ Security Diary)
Malicious GitHub repository created by a threat actor (Source – IIJ Security Diary)

The final stage deploys MoonPeak itself, obfuscated using ConfuserEx to resist decompilation and analysis. The malware connects to its command-and-control server at 27.102.137[.]88:443, enabling attackers to remotely control infected machines.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareSecurityThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

New WordPress Backdoor Vulnerability Creates Malicious Admins

Next Post

Microsoft Gives FBI BitLocker Keys for Guam Fraud Laptops

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
DDoS Malware Exploits Jenkins to Attack Source Engine Games
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us