Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/Threats/Threat Actors Hide Stealthy PURELOGS in Hiding Payload
Threats

Threat Actors Hide Stealthy PURELOGS in Hiding Payload

A newly discovered attack campaign has exposed a sophisticated delivery method for the PURELOGS infostealer. This commodity malware is widely sold as a service on underground forums. Threat actors...

Sarah simpson
Sarah simpson
January 21, 2026 3 Min Read
0 0

A newly discovered attack campaign has exposed a sophisticated delivery method for the PURELOGS infostealer. This commodity malware is widely sold as a service on underground forums.

Threat actors are using weaponized PNG files hosted on legitimate infrastructure to deliver the payload while evading detection systems.

The campaign begins with deceptive phishing emails disguised as pharmaceutical invoices, containing a malicious ZIP file that triggers a multi-stage attack chain designed to bypass traditional security controls.

The attack chain demonstrates how modern cybercriminals leverage legitimate services to hide their tracks.

After users execute the initial JScript dropper within the ZIP archive, the malware reaches out to archive.org, a trusted website, to download what appears to be an innocent image file.

However, this polyglot PNG contains a hidden Base64-encoded payload embedded after the official image data ends, allowing the file to render normally while concealing malicious code from both users and security tools.

Security analysts from Swiss Post Cybersecurity identified and analyzed this previously unnoticed campaign after the unusual phishing sample caught their attention.

PureLogs infection chain (Source - Swiss Post Cybersecurity)
PureLogs infection chain (Source – Swiss Post Cybersecurity)

Louis Schrmann, Security Analyst at Swiss Post Cybersecurity, detailed how the loader bypasses four layers of obfuscation to reveal PURELOGS at its core.

The discovery highlights how attackers combine known malware with innovative staging infrastructure to maximize evasion and delivery success.

Unreadable file (Source - Swiss Post Cybersecurity)
Unreadable file (Source – Swiss Post Cybersecurity)

What makes this attack particularly concerning is its use of fileless execution techniques throughout the entire infection chain. The PowerShell payload never touches the disk, existing only in memory during its execution phase.

This approach renders file-based antivirus signatures and hash-based detection methods completely ineffective against this threat.

The financial incentive behind these attacks is substantial. PURELOGS operates as Malware-as-a-Service, with subscriptions starting at just $150 per month, making it accessible to operators with varying levels of technical skill.

Polyglot PNG (Source - Swiss Post Cybersecurity)
Polyglot PNG (Source – Swiss Post Cybersecurity)

This democratization of malware means organizations face threats from both sophisticated groups and novice attackers using identical tools.

Detection Evasion Through Polyglot PNG Architecture

The core innovation in this campaign lies in how threat actors weaponized PNG files to hide the PURELOGS payload while maintaining file integrity.

The decoded PowerShell script from stage one doesn’t fetch an executable from a disposable domain, which would immediately raise flags during network analysis.

Instead, it downloads a PNG image from archive.org, a request that appears benign to network defenders and security monitoring tools.

Pure coder bot (Source - Swiss Post Cybersecurity)
Pure coder bot (Source – Swiss Post Cybersecurity)

The technical sophistication becomes apparent when examining the file structure. The attackers embedded their Base64-encoded payload after the IEND chunk, which marks the formal end of PNG image data according to the image format specification.

The payload sits between custom markers labeled “BaseStart-” and “-BaseEnd,” remaining completely hidden within the image file while the image continues to render perfectly in any image viewer.

This polyglot approach allows the file to function as both a legitimate PNG image and a container for malicious code.

The malware extracts the payload using regex pattern matching to find content between the custom markers, then Base64-decodes the results and loads the assembly directly into memory using .NET Reflection.

This two-stage extraction process ensures the actual malware code never exists on disk in its executable form.

The PowerShell process launches a hidden execution environment and runs the decoded payload through the Invoke-Expression cmdlet, completing the in-memory execution that defeats disk-based security controls.

The sophisticated use of archive.org’s reputation as cover demonstrates how attackers weaponize trust relationships established by legitimate infrastructure to blend their traffic with normal internet activity.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCybersecurityMalwarephishingSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Weaponized Shipping Docs Deliver Remcos RAT Malware Threat

Next Post

Oracle Critical Patch Fixes 337 Vulner Security Vulnerabilities

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us