Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

PS1Bot Malware Spreads via Ads

August 14, 2025
Reading Time: 3 mins read
in Alerts
PS1Bot Malware Spreads via Ads

Cybersecurity researchers have uncovered a new and sophisticated malvertising campaign that is actively infecting users with a multi-stage malware framework known as PS1Bot. This threat, which has been active since early 2025, utilizes malvertising and search engine optimization (SEO) poisoning to deliver its initial payload. Once a victim downloads a malicious compressed archive, a JavaScript payload inside the ZIP file initiates a series of events, leading to the execution of a PowerShell script. This script acts as the core component, reaching out to a command-and-control (C2) server to fetch further modules, each designed for a specific malicious purpose.

PS1Bot is characterized by its modular design, allowing threat actors to deploy various functionalities on compromised systems as needed. The malware is designed with stealth as a priority, employing in-memory execution techniques to avoid leaving persistent artifacts on the victim’s machine, thereby minimizing its forensic trail. Researchers from Cisco Talos have identified several modules, including an information stealer, a keylogger, a screen capture tool, and a wallet grabber. The information stealer, in particular, is highly targeted, using embedded wordlists to find files containing passwords and cryptocurrency wallet seed phrases. This modularity offers significant flexibility, enabling attackers to rapidly update or add new capabilities to the malware.

The campaign and the PS1Bot malware show notable overlaps with previously documented cyber threats, suggesting a connection to known threat actor groups. PS1Bot shares technical similarities with AHK Bot, an AutoHotkey-based malware previously used by groups like Asylum Ambuscade and TA866. Furthermore, this activity cluster has been linked to prior ransomware campaigns that utilized a malware called Skitnet (also known as Bossnet). These connections indicate that the actors behind PS1Bot may be experienced and are likely leveraging their existing toolkit and tactics to expand their malicious operations, including data theft and establishing remote control over infected hosts.

The initial infection vector typically starts with a user encountering a malicious ad or a poisoned search result. The user is then tricked into downloading a ZIP file. The JavaScript payload within this archive fetches and executes a scriptlet from an external server, which subsequently writes and runs a PowerShell script on the disk. This script, once active, establishes communication with the C2 server to download and execute additional PowerShell commands. The modular nature of the malware allows the attackers to augment its functionality in real-time, performing actions from simple system reconnaissance to highly invasive data theft, all while working to maintain persistent access to the compromised machine.

This disclosure about the PS1Bot campaign comes as Google announced its use of AI and large language models (LLMs) to combat invalid traffic (IVT) and deceptive ad practices. Google’s new AI-powered systems are designed to analyze ad placements, app and web content, and user interactions to more precisely identify invalid behaviors. The company claims these new applications have already led to a 40% reduction in IVT stemming from deceptive ad serving practices. While Google’s efforts are focused on improving ad quality and safety, the discovery of the PS1Bot campaign highlights the ongoing and evolving challenge of malvertising and the sophisticated techniques threat actors are employing to bypass security measures.

Reference:

  • PS1Bot Malware Uses Malvertising for Multi-Stage In-Memory Attack Campaign
Tags: August 2025Cyber AlertsCyber Alerts 2025CyberattackCybersecurity
ADVERTISEMENT

Related Posts

SAP Patches Critical NetWeaver Flaw

EggStreme Malware Hits Philippine Military

September 11, 2025
SAP Patches Critical NetWeaver Flaw

RatOn Malware Hits Android Banking

September 11, 2025
SAP Patches Critical NetWeaver Flaw

SAP Patches Critical NetWeaver Flaw

September 11, 2025
Unreported Domains Expose Salt Typhoon

Unreported Domains Expose Salt Typhoon

September 10, 2025
Microsoft Warns of AD DS Flaw

Microsoft Warns of AD DS Flaw

September 10, 2025
Microsoft Warns of AD DS Flaw

Hackers Exploit Adobe Commerce Bug

September 10, 2025

Latest Alerts

RatOn Malware Hits Android Banking

EggStreme Malware Hits Philippine Military

SAP Patches Critical NetWeaver Flaw

Unreported Domains Expose Salt Typhoon

Hackers Exploit Adobe Commerce Bug

Microsoft Warns of AD DS Flaw

Subscribe to our newsletter

    Latest Incidents

    DDoS Defender Hit by Massive Attack

    Vienna VA Reports Data Breach Leak

    GitHub Hack Triggers Salesloft Breach

    Nexar Dashcam Database Breached

    Wealthsimple Platform Data Breach

    Cornwell Tools Data Breach Hits 104k

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial