Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Microsoft Warns: Attackers Use HPE Agent for Malware-
May 15, 2026
Tycoon 2FA Operators Use OAuth Phishing to Bypass Adopt Device
May 15, 2026
Critical cPanel Flaws Allow Access to Sensitive System
May 15, 2026
Home/Threats/Black Cat Hackers Use Fake Notepad++ Sites Group Install
Threats

Black Cat Hackers Use Fake Notepad++ Sites Group Install

The notorious Black Cat cybercriminal group has aggressively resurfaced, launching a sophisticated malware campaign that leverages advanced search engine optimization techniques to distribute...

Sarah simpson
Sarah simpson
January 7, 2026 2 Min Read
16 0

The notorious Black Cat cybercriminal group has aggressively resurfaced, launching a sophisticated malware campaign that leverages advanced search engine optimization techniques to distribute counterfeit versions of popular open-source software.

By manipulating search engine algorithms, the gang successfully positions meticulously crafted phishing websites for tools like Notepad++ at the very top of keyword search results.

This strategic placement ruthlessly exploits user trust in familiar platforms, leading unsuspecting victims to download malicious installers that are secretly bundled with dangerous remote control backdoors capable of stealing sensitive host data.

When users navigate to these fraudulent domains, they encounter a highly realistic interface that mirrors legitimate software repositories, often featuring numerous tutorial articles to artificially enhance credibility.

Phishing website page (Source – Weixin)

The deceptive download process deliberately involves multiple redirects, eventually guiding the user to a fake page styled to resemble GitHub.

This layering of legitimacy is designed to lower victim suspicion effectively before delivering the compromised software payload to the host system.

Weixin analysts noted that this rampant campaign successfully compromised approximately 277,800 servers effectively between early and late December 2025.

The malware’s primary objective remains the covert exfiltration of highly sensitive information, including browser user data, real-time keystroke logs, and clipboard contents.

This extensive data theft poses severe and immediate security risks to both individual users and larger organizational infrastructures exposed to the threat.

Infection and Execution Mechanism

The malware’s infection process is technically intricate. Upon initial execution, the installer creates a deceptive shortcut on the victim’s desktop, which points directly to the backdoor’s entry point instead of the actual application.

The malware cleverly employs a white and black execution strategy, utilizing a benign executable to load a malicious DLL component.

This DLL is specifically tasked with locating and decrypting a concealed encrypted file named M9OLUM4P.1CCE. While the malicious DLL file decrypts and executes encrypted file.

Malicious DLL file decrypts and executes encrypted file (Source - Weixin)
Malicious DLL file decrypts and executes encrypted file (Source – Weixin)

Following the successful decryption process, the malicious PE file is loaded directly into the system’s memory via reflection, a tactic that helps bypass standard disk-based detection mechanisms.

The malware ensures its longevity by creating specific registry startup items and immediately initiates communication with its command-and-control server, hardcoded as sbido.com:2869.

This persistent connection facilitates the continuous transmission of stolen data, while the domain’s resolution IP is frequently updated by the attackers to evade static network-based blocking measures.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitHackerMalwarephishingSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Forcepoint DLP Flaw Allows Memory Manipulation & Code Execution

Next Post

Hackers Exploited Routing & Misconfigurations to Spoof Or

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
TeamPCP Hackers Steal Cloud & Developer Credentials via
May 15, 2026
Microsoft Exposes Kazuar Malware’s Modular P Details Malware’s
May 15, 2026
VMware Fusion Vulnerability Let Attackers Escalate Privilege to Root
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us