Cybersecurity firm SafeBreach has issued a warning about a new PowerShell backdoor that disguises itself as part of the Windows update process to remain fully undetected.
Operated by a sophisticated, unknown threat actor, the backdoor is distributed via a malicious Word document that appears linked to a LinkedIn-based job application spear-phishing lure.
When the document is opened, macro code inside it drops a PowerShell script on the victim’s machine, creates a scheduled task claiming to be part of a Windows update, and then executes the script from a fake update folder.
The script was designed to execute another PowerShell script but, before the scheduled task is executed, two other scripts are dropped on the system.
“The content of the PowerShell scripts is stored in text boxes inside the Word document and will be saved to the same fake update directory,” SafeBreach said in a note documenting the threat.
While analyzing the two scripts, the company’s researchers discovered that some coding errors could allow them to determine the potential number of victims: one of the scripts was likely installed on more than 70 systems, while the other likely had over 50 installations.
SafeBreach says that the attackers used the scripts to execute specific commands for information gathering, local user enumeration, file listing, file deletion, and Active Directory user enumeration.
SafeBreach has published indicators of compromise (IoCs) associated with this PowerShell backdoor and warns that it is fully undetectable.
Related: Seven ‘Creepy’ Backdoors Used by Lebanese Group in Israel Attacks
Related: New Cyberespionage Group ‘Worok’ Targeting Entities in Asia
Related: Brute Force Attacks Against SQL Servers Use PowerShell Wrapper

More from Ionut Arghire
- Critical WooCommerce Payments Vulnerability Leads to Site Takeover
- PoC Exploit Published for Just-Patched Veeam Data Backup Solution Flaw
- CISA Gets Proactive With New Pre-Ransomware Alerts
- CISA, NSA Issue Guidance for IAM Administrators
- Cisco Patches High-Severity Vulnerabilities in IOS Software
- ‘Nexus’ Android Trojan Targets 450 Financial Applications
- ‘Badsecrets’ Open Source Tool Detects Secrets in Many Web Frameworks
- Chrome 111 Update Patches High-Severity Vulnerabilities
Latest News
- US Charges 20-Year-Old Head of Hacker Site BreachForums
- Tesla Hacked Twice at Pwn2Own Exploit Contest
- CISA Ships ‘Untitled Goose Tool’ to Hunt for Microsoft Azure Cloud Infections
- Critical WooCommerce Payments Vulnerability Leads to Site Takeover
- PoC Exploit Published for Just-Patched Veeam Data Backup Solution Flaw
- CISA Gets Proactive With New Pre-Ransomware Alerts
- Watch on Demand: Supply Chain & Third-Party Risk Summit Sessions
- TikTok CEO Grilled by Skeptical Lawmakers on Safety, Content
