Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical Palo Alto Firewall Vulnerability Exploited for Root Access
May 6, 2026
Optimize SOC Costs & Boost Confidence with Better Threat Intelligence
May 5, 2026
GnuTLS 3.8.13 Released with Fix for 12 Vulnerabilities Affecting
May 5, 2026
Home/Threats/Attackers Impersonate MalwareBytes to Steal Threat Actors
Threats

Attackers Impersonate MalwareBytes to Steal Threat Actors

A new malware campaign is actively tricking users into downloading fraudulent Malwarebytes software. This deceptive tactic puts their login credentials and cryptocurrency wallets at serious risk....

David kimber
David kimber
January 19, 2026 2 Min Read
0 0

A new malware campaign is actively tricking users into downloading fraudulent Malwarebytes software. This deceptive tactic puts their login credentials and cryptocurrency wallets at serious risk.

Security researchers discovered this operation actively spreading between January 11 and January 15, 2026, using specially crafted ZIP files that impersonate legitimate Malwarebytes installers.

The fake files are named malwarebytes-windows-github-io-X.X.X.zip, making them appear authentic to unsuspecting users who believe they are downloading genuine antivirus protection.

The campaign’s primary goal centers on delivering an information-stealing malware that harvests sensitive user data.

Content of the TXT file (Source - VirusTotal)
Content of the TXT file (Source – VirusTotal)

These malicious ZIP archives contain a dangerous combination of files designed to bypass security defenses and establish persistence on infected systems.

When users extract and run what appears to be the legitimate Malwarebytes executable, they unknowingly trigger a chain of malicious events that ultimately compromises their digital security and personal information.

VirusTotal analysts identified the malware after examining the infection patterns and file structures, noting that all suspicious ZIP archives share a consistent identifier known as a behash value of “4acaac53c8340a8c236c91e68244e6cb.”

This technical marker became crucial in tracking the campaign’s scope and identifying additional variants used in the operation.

The researchers documented how the malware operates through a sophisticated layering technique that makes detection and analysis more challenging.

DLL Sideloading: The Attack Mechanism

The attack relies on a deceptive technique called DLL sideloading, which exploits how Windows loads legitimate software libraries. The malicious payload is hidden inside a file named CoreMessaging.dll.

The identified DLLs (Source - VirusTotal)
The identified DLLs (Source – VirusTotal)

When the legitimate Malwarebytes executable runs, the operating system loads this malicious DLL instead of the genuine library file.

Threat actors place both the fake DLL and legitimate EXE in the same folder, tricking Windows into executing the malware without raising suspicion.

The malicious DLLs feature distinctive metadata including signature strings like “© 2026 Eosinophil LLC” and unusual exported functions containing alphanumeric sequences such as “15Mmm95ml1RbfjH1VUyelYFCf” and “2dlSKEtPzvo1mHDN4FYgv.”

These characteristics allow security researchers to hunt for related samples and track the broader campaign.

Once the malicious DLL executes, it drops secondary-stage infostealers that specifically target cryptocurrency wallet information and stored browser credentials, enabling attackers to commit identity theft and cryptocurrency theft.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Attackers Use WSL2 for Stealthy Hideouts in Windows

Next Post

Leaks Expose Hidden Infrastructure of Ransomware Operations

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Cisco Acquires Astrix Security to Boost Strengthen Agent
May 5, 2026
China-Aligned SHADOW-EARTH-053 Exploits Exchange Servers to Deploy
May 5, 2026
ScarCruft Supply Chain Attack Hits Gaming with Platform Windows
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us