Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Venom Spiders More Eggs Malware Hits Hiring

May 21, 2025
Reading Time: 3 mins read
in Alerts
Teen Hacker Admits PowerSchool Cyberattack

The More_Eggs malware is a sophisticated JavaScript backdoor posing a significant corporate threat. It is operated by the financially motivated Venom Spider group also known as Golden Chickens. This dangerous backdoor is notably distributed through a Malware-as-a-Service or Malware-as-a-Service (MaaS) model. Various other malicious threat actors can easily purchase and then utilize this service. These customers include notorious cybercriminal groups such as FIN6 and also the Cobalt Group. More_Eggs primarily targets corporate human resources departments by exploiting their inherent trust. It turns what appears as legitimate candidate correspondence into very dangerous attack vectors. This makes routine job application emails a primary source of potential system compromise.

These insidious attacks begin with seemingly innocent looking job application email messages.

These emails typically contain malicious ZIP file attachments for the unsuspecting HR employee. The compressed archive usually includes a harmless decoy image file to appear legitimate. Alongside this decoy a malicious Windows shortcut LNK file is also cleverly hidden. When this shortcut is triggered it initiates a complex chain of damaging events. This chain ultimately deploys the More_Eggs backdoor giving attackers full remote system access. Denwp Research analysts recently identified a More_Eggs sample named “Sebastian Hall.zip”. This particular sample clearly exemplifies the Venom Spider threat group’s current attack techniques.

This clever social engineering approach effectively circumvents typical human vigilance and security awareness.

The serious impact of More_Eggs malware extends far beyond the initial system compromise. This backdoor provides attackers with a wide range of powerful remote control capabilities. They can easily harvest detailed system information from any of the infected machines. Attackers can also deploy additional malicious payloads onto the compromised system when needed. More_Eggs is expertly designed to establish long-term persistence on any targeted systems. This creates a very significant and ongoing security risk for all affected organizations. HR departments processing numerous job applications daily are especially vulnerable to this threat. The malware’s advanced polymorphic nature ensures each victim receives a quite unique payload. This sophisticated feature greatly complicates detection efforts by many traditional antivirus security tools.

The complex infection chain begins when a victim opens the malicious LNK attachment file. This action triggers the immediate execution of a complex obfuscated command line sequence. The deceptive script then launches Microsoft Word as a decoy to distract the user. It simultaneously conducts its malicious activities quietly in the system’s background processes. Through variable manipulation it builds a command to create a configuration file ieuinit.inf. This INF file mimics a legitimate Windows file but contains encoded C2 URLs. Crucially the script copies a legitimate Windows binary ieuinit.exe to the temporary directory. It then executes this trusted system binary using special hidden malicious command parameters. This is a common living-off-the-land technique abusing legitimate system tools for malicious purposes. The JavaScript payload uses anti-analysis techniques and server-side polymorphism to evade detection.

Reference:

  • More Eggs Malware-as-a-Service Infects Corporate Hiring Via Deceptive Job Lures
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityMay 2025
ADVERTISEMENT

Related Posts

Forminator Plugin Flaw Risks 600,000 Sites

Forminator Plugin Flaw Risks 600,000 Sites

July 2, 2025
Forminator Plugin Flaw Risks 600,000 Sites

Oil-Themed Phishing Spreads Snake Keylogger

July 2, 2025
Forminator Plugin Flaw Risks 600,000 Sites

Kimsuky Tricks Users Into Self Hacking

July 2, 2025
C4 Bomb Cracks Chrome Cookie Encryption

Scammers Use Fake Ads to Steal Pi Wallets

July 1, 2025
C4 Bomb Cracks Chrome Cookie Encryption

Blind Eagle Uses VBS Scripts to Deploy RATs

July 1, 2025
C4 Bomb Cracks Chrome Cookie Encryption

C4 Bomb Cracks Chrome Cookie Encryption

July 1, 2025

Latest Alerts

Oil-Themed Phishing Spreads Snake Keylogger

Forminator Plugin Flaw Risks 600,000 Sites

Kimsuky Tricks Users Into Self Hacking

Scammers Use Fake Ads to Steal Pi Wallets

Blind Eagle Uses VBS Scripts to Deploy RATs

C4 Bomb Cracks Chrome Cookie Encryption

Subscribe to our newsletter

    Latest Incidents

    Cyberattack on Brazils CM Software Vendor

    Cyberattack Halts Hero España Production

    Hacker Attack on Australian Airline Qantas

    Cyberattack Hits Austrian Hospital Vendor

    Sophisticated Attack Hits War Crimes Court

    Ransomware Hits Swiss Government Vendor

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial