Malware & RansomwareHIGH

DeepLoad Malware - AI-Generated Evasion Targets Enterprises

Featured image for DeepLoad Malware - AI-Generated Evasion Targets Enterprises
CSCyber Security News
DeepLoadcredential theftmalware evasionPowerShellWMI subscription
🎯

Basically, DeepLoad is a sneaky malware that steals passwords and hides from security tools.

Quick Summary

DeepLoad malware is targeting enterprises with AI-driven evasion tactics. It's stealing credentials and spreading rapidly. Organizations must act fast to secure their networks.

What Happened

A newly discovered malware called DeepLoad is making waves in enterprise environments. This malware cleverly turns a single user action into persistent access that steals credentials and survives even after reboots. What sets DeepLoad apart is its ability to outsmart the security measures that most organizations rely on. It arrives through a method called ClickFix, where attackers trick employees into pasting a PowerShell command to fix a fake browser error.

This command creates a scheduled task that ensures the malware re-executes on every reboot. It uses mshta.exe, a legitimate Windows utility, to fetch an obfuscated payload from the attackers' servers. The speed of this attack is alarming; the malicious domains were serving content within just 22 minutes of going live, leaving little time for response teams to react.

Who's Being Targeted

DeepLoad primarily targets enterprise networks, making it a significant threat to businesses of all sizes. Once inside, it begins stealing credentials almost immediately. The malware spreads quickly, infecting USB drives within ten minutes of the initial compromise. This means that the first infected host is unlikely to be the only one affected, increasing the potential impact on the organization.

The malware drops a credential stealer named filemanager.exe, which blends into process lists to avoid detection. It operates on its own command-and-control channel, ensuring that data continues to be stolen even if the primary loader is blocked. Additionally, a malicious browser extension captures passwords and session tokens, persisting across user sessions until removed.

Signs of Infection

One of the most concerning aspects of DeepLoad is its ability to remain hidden. It plants a WMI event subscription during the initial compromise, which allows it to reinfect the host without any user action. In one instance, this subscription triggered three days after the host appeared clean, silently dropping filemanager.exe back into the user's Downloads folder.

Moreover, DeepLoad employs advanced evasion techniques. Its PowerShell loader is padded with meaningless variable assignments, making it look busy while the actual malicious logic sits hidden. This obfuscation layer is likely generated by AI, allowing for quick redeployment of new variants before defenders can adapt.

How to Protect Yourself

To combat DeepLoad, organizations must take immediate action. Enable PowerShell Script Block Logging to capture decoded runtime commands and bypass obfuscation. All WMI event subscriptions on affected hosts should be audited and cleared before returning any machine to production.

Furthermore, every credential accessible from an infected host must be rotated immediately. USB drives connected to affected endpoints should be thoroughly audited before reuse. Lastly, organizations should shift from traditional file-based scanning to behavioral detection methods using EDR telemetry and memory scanning to catch this sophisticated malware.

🔒 Pro insight: DeepLoad's use of AI-generated obfuscation indicates a shift in malware development, requiring advanced detection strategies to keep pace.

Original article from

CSCyber Security News· Tushar Subhra Dutta
Read Full Article

Related Pings

HIGHMalware & Ransomware

Ransomware Trends in 2025 - Blending in is the Strategy

Ransomware tactics are evolving, blending in with normal user activity. Key sectors like manufacturing are at risk. Organizations must adapt their defenses to combat these sophisticated threats.

Cisco Talos Intelligence·
HIGHMalware & Ransomware

Axios npm Package Compromised - Supply Chain Attack Unveiled

Malicious Axios npm packages were published, injecting a remote access trojan. Developers and CI/CD systems are at risk. Immediate action is needed to secure your systems.

Snyk Blog·
HIGHMalware & Ransomware

Google Drive - Detects Ransomware and Restores Files

Google Drive has launched ransomware detection and file restoration features. This helps users quickly recover from malware attacks, minimizing data loss and disruption. Organizations can now better protect their critical data with these advanced tools.

Help Net Security·
HIGHMalware & Ransomware

IRS Tax Filing Lures - Cybercriminals Push Malware Campaigns

Cybercriminals are exploiting tax season with organized phishing attacks. They impersonate the IRS to install malware and steal credentials. Awareness and training are key to staying safe.

Cyber Security News·
HIGHMalware & Ransomware

RoadK1ll Malware - New Threat Turns Hosts Into Network Relays

RoadK1ll malware is turning compromised machines into stealthy network relays. This allows attackers to penetrate deeper into secure networks, posing significant risks to organizations. Stay vigilant and monitor your systems for unusual activity.

Cyber Security News·
HIGHMalware & Ransomware

Qilin Ransomware - Allegedly Breaches Dow Inc. Amid Claims

Qilin ransomware claims a breach of Dow Inc., a major chemical manufacturer. While listed on their leak site, no proof has been provided yet. This raises concerns about potential data exposure and the growing threat of ransomware attacks.

Security Affairs·