Security experts are being targeted with fake malware discoveries

A digital representation of a lock
(Image credit: Altalex)

  • Trend Micro spots piece of malware being advertised as PoC fork for a major Windows vulnerability
  • The malware acts as an infostealer, grabbing vital system information
  • These types of attacks are often conducted by nation-states

Cybercriminals are targeting security researchers with fake proof-of-concept (PoC) solutions, trying to infect their computers with infostealing malware, experts have warned.

Cybersecurity researchers Trend Micro, who spotted the new campaign in January 2025, noted how the crooks would publish a PoC for a popular, critical-severity vulnerability, to draw the attention of the cybersecurity crowd.

The researchers would then grab the PoC for analysis, and would end up installing a piece of malware, instead.

Stealing vital PC information

In this particular case, the crooks were advertising a fork of a legitimate, existing PoC for LDAPNightmare, a vulnerability discovered earlier in January, and consisting of two flaws, CVE-2024-49112, and CVE-2024-49113.

The former serves as bait here, since it is a 9.8/10 severity flaw, affecting Windows Lightweight Directory Access Protocol (LDAP), and allowing for remote code execution (RCE).

In its writeup, Trend Micro researcher Sarah Pearl Camiling said “both vulnerabilities were deemed as highly significant due to the widespread use of LDAP in Windows environments.” Both flaws were patched in December 2024, through the Patch Tuesday cumulative update.

In the fake PoC, the crooks replaced some of the legitimate files with an executable named “poc.exe”. This would deploy a PowerShell script which would, in turn, deploy another script that steals data from the computer.

Here is what the infostealer goes for:

- PC information
- Process list
- Directory lists (Downloads, Recent, Documents, and Desktop)
- Network IPs
- Network adapters
- Installed updates

This type of attack is nothing new - criminals have regularly been observed applying the same tactics in the past.

Although this was not hinted at in the report, these types of attacks are often conducted by nation-state actors, in an attempt to gather vital intelligence regarding the cybersecurity practices of large tech organizations, government firms, critical infrastructure players, and more.

Via The Register

You might also like

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
These fake macOS updates are actually just looking to spread malware
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
Microsoft Teams and other Windows tools hijacked to hack corporate networks
Trojan
Hackers hide malware into website images to go unnoticed
A red padlock image against a digital map of the earth in blue.
Midnight Blizzard hacking group hijacks RDP proxies to launch malware attacks
A white padlock on a dark digital background.
Developers targeted by malicious Microsoft VSCode extensions
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
Fake Reddit sites found pushing Lumma Stealer malware
Latest in Security
A laptop with a red screen with a white skull on it with the message: "RANSOMWARE. All your files are encrypted."
Major ransomware attack sees Tata Technologies hit - 1.4TB dataset with over 730,000 files allegedly stolen
Security
Broadcom releases fixes for multiple VMware security flaws
A graphic showing fleet tracking locations over a city.
Lost & Found tracking site hit by major data breach - over 800,000 could be affected
US President Donald Trump speaks to the press as he signs an executive order to create a US sovereign wealth fund, in the Oval Office of the White House on February 3, 2025, in Washington, DC.
US set to pause cyber-offensive operations against Russia - but CISA says it won't stop
Web DDoS attacks see major surge as AI allows more powerful attacks
Polish space agency says it was hit by a cyberattack
Latest in News
The Samsung Galaxy Ring in Titanium Silver
A future Samsung Galaxy Ring could have a feature to stop you burning yourself on your morning coffee
The maps feature of the Strava app open on an iPhone 15 Pro
Strava does a u-turn as users are allowed to post external links again
CorelDraw Go homepage showing design examples
Adobe arch-rival unveils online graphic design tool for beginners - and yes, it has a subscription
Android Auto
Android Auto is about to get a big Gemini upgrade – and there's good news and bad news
Tony Hawk's Pro Skater 3+4 promo image featuring the Doom Slayer glaring at Tony
Tony Hawk's Pro Skater 3+4 is real and the Digital Deluxe Edition literally turns it into a Doom game
Ada Lovelace as a leader in Civilization 7.
Sid Meier's Civilization 7 update 1.1.0 finally stops AI leaders from flooding your territory with armies of explorers