Security Experts:

Connect with us

Hi, what are you looking for?


Application Security

New PowerShell Backdoor Poses as Part of Windows Update Process

Cybersecurity firm SafeBreach has issued a warning about a new PowerShell backdoor that disguises itself as part of the Windows update process to remain fully undetected.

Cybersecurity firm SafeBreach has issued a warning about a new PowerShell backdoor that disguises itself as part of the Windows update process to remain fully undetected.

Operated by a sophisticated, unknown threat actor, the backdoor is distributed via a malicious Word document that appears linked to a LinkedIn-based job application spear-phishing lure.

When the document is opened, macro code inside it drops a PowerShell script on the victim’s machine, creates a scheduled task claiming to be part of a Windows update, and then executes the script from a fake update folder.

The script was designed to execute another PowerShell script but, before the scheduled task is executed, two other scripts are dropped on the system.

“The content of the PowerShell scripts is stored in text boxes inside the Word document and will be saved to the same fake update directory,” SafeBreach said in a note documenting the threat.

While analyzing the two scripts, the company’s researchers discovered that some coding errors could allow them to determine the potential number of victims: one of the scripts was likely installed on more than 70 systems, while the other likely had over 50 installations.

SafeBreach says that the attackers used the scripts to execute specific commands for information gathering, local user enumeration, file listing, file deletion, and Active Directory user enumeration.

SafeBreach has published indicators of compromise (IoCs) associated with this PowerShell backdoor and warns that it is fully undetectable.

Related: Seven ‘Creepy’ Backdoors Used by Lebanese Group in Israel Attacks

Related: New Cyberespionage Group ‘Worok’ Targeting Entities in Asia

Related: Brute Force Attacks Against SQL Servers Use PowerShell Wrapper

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...


The North Korean APT tracked as TA444 is either moonlighting from its previous primary purpose, expanding its attack repertoire, or is being impersonated by...

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...