Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
AiTM Phishing Attacks Target SharePoint, HubSpot, Google
May 2, 2026
Attackers Abuse AppSheet, Netlify, Telegram for Google Facebook
May 2, 2026
Home/Threats/New Watering Hole Attack Targets EmEditor Users with Stealer Malware
Threats

New Watering Hole Attack Targets EmEditor Users with Stealer Malware

A new, significant security threat is now targeting developers who rely on EmEditor, a popular text editor particularly favored by Japanese programming communities. In late December 2025, the...

Marcus Rodriguez
Marcus Rodriguez
January 23, 2026 3 Min Read
0 0

A new, significant security threat is now targeting developers who rely on EmEditor, a popular text editor particularly favored by Japanese programming communities.

In late December 2025, the software’s official download page fell victim to a compromise that allowed attackers to distribute malicious versions of the installer to unsuspecting users.

The attack demonstrates how trusted software platforms can become dangerous delivery mechanisms for sophisticated malware.

Developers and organizations worldwide who rely on this tool faced immediate risk during the window before the compromise was discovered and disclosed publicly.

The attackers strategically positioned their modified installer to deliver a multistage malware payload designed for credential theft, data harvesting, and lateral movement within networks.

When users downloaded what appeared to be the legitimate EmEditor software, they unknowingly installed a trojanized version capable of stealing sensitive information and enabling follow-up intrusions.

EmEditor posting an advisory regarding the compromise to their webpage (Source - Trend Micro)
EmEditor posting an advisory regarding the compromise to their webpage (Source – Trend Micro)

The timing of the attack, coinciding with year-end holidays when security teams often operate with reduced staffing, suggests the threat actors deliberately chose this window to maximize their chances of remaining undetected during the critical initial infection phase.

Trend Micro analysts identified this supply chain attack as part of their ongoing threat intelligence work, providing detailed technical analysis of the malware’s construction and capabilities.

The compromised installer file has its CustomAction script modified to execute a malicious command (Source - Trend Micro)
The compromised installer file has its CustomAction script modified to execute a malicious command (Source – Trend Micro)

The research team discovered that the compromised installer triggers a PowerShell command upon execution, retrieving the first-stage payload from a deceptively named domain.

The malware then downloads two additional payloads that establish persistence and begin collecting system information, all while employing sophisticated obfuscation techniques to avoid early detection systems.

New Watering Hole Attacking EmEditor Users with Stealer Malware

The compromised .MSI installer file contains modified scripts that execute without triggering obvious security warnings.

Deobfuscated code of the first stage (Source - Trend Micro)
Deobfuscated code of the first stage (Source – Trend Micro)

Once launched, it spawns a PowerShell command that retrieves obfuscated code from remote servers hosted at domains mimicking legitimate EmEditor infrastructure.

The attackers employed string manipulation techniques throughout the scripts, making the code difficult to analyze through automated security tools.

The first payload connects to two additional URLs to retrieve the main malware components, each performing distinct malicious functions including credential harvesting, security software detection, and system fingerprinting.

The second payload operates as the primary antisecurity mechanism, disabling PowerShell Event Tracing for Windows to prevent security logging.

It also accesses Windows Credential Manager to extract stored passwords and captures screenshots of infected systems.

The third payload handles command-and-control communications with attacker infrastructure while performing geofencing checks that exclude specific countries, suggesting Russian or Commonwealth of Independent States involvement.

Technical analysis indicates the malware contains a consistent campaign identifier across all communications, helping researchers track affected systems and coordinate response efforts across the industry.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

New Phishing Kit Attacks Google, Microsoft, As-a-service Attacking

Next Post

Node.js HackerOne Program Now Requires Signal Updated Higher

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
DDoS Malware Exploits Jenkins to Attack Source Engine Games
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us