Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Evasive Memory-Only Malware PEAKLIGHT Uses Pirated Movies To Deliver Payloads

    Evasive Memory-Only Malware PEAKLIGHT Uses Pirated Movies To Deliver Payloads

    August 23, 2024

    Cybersecurity experts have detailed a sophisticated new memory-only dropper linked to a multi-stage malware infection process. This dropper, dubbed PEAKLIGHT, poses a massive threat due to its stealthy operations and complex attack chain.

    PEAKLIGHT operates without leaving traces on disk and with several obfuscation techniques, making detection severely challenging.

    From Pirated Movies to Malicious Payloads

    The infection begins when users download pirated movie files that are actually just malicious ZIP files in disguise, and contain Microsoft Shortcut Files (LNK) to kick off the infection.

    These LNK files trigger a PowerShell script that downloads additional malicious content from a remote server. According to the study by Mandiant, the infection chain reveals two variations in the PowerShell scripts used, demonstrating the attackers’ skill in bypassing traditional security measures by leveraging trusted system processes.

    Source: https://cloud.google.com/blog/

    Using legitimate system binaries to download and execute payloads
    Employing registry queries for the same purpose.

    Once the initial infection is established, PEAKLIGHT proceeds to its second stage, where a JavaScript-based dropper, hidden within the victim’s system memory, decodes and executes the final downloader. This downloader, known as PEAKLIGHT, operates in two primary variations, each with distinct characteristics but with a common objective: to download additional malicious files from a content delivery network (CDN).

    PEAKLIGHT Variants

    PEAKLIGHT’s sophistication lies in its ability to check for specific ZIP archives in hard-coded file paths. If absent, it downloads them from a content delivery network (CDN). The malware has been observed downloading various payloads, including LUMMAC.V2, SHADOWADDER and CRYPTBOT.

    Different PEAKLIGHT variations exist, each with distinct behaviors, including target directories, execution logic, and downloaded file names. The variations employ complex obfuscation techniques, including hexadecimal and Base64 encoding, to conceal the true nature of their payloads.

    PEAKLIGHT Variation 1:

    Downloads files to the AppData directory
    Executes files based on their names
    Downloads a decoy video file to mask activity

    PEAKLIGHT Variation 2:

    Targets the ProgramData directory
    Executes files based on discovery order

    PEAKLIGHT Variation 3:

    Retrieves payloads from a different domain
    Drops additional malicious files, including AutoIt binaries

    Protecting Against PEAKLIGHT

    To mitigate PEAKLIGHT threats, the researchers recommend the following actions:

    Scan your environment against the potential indicators of compromise (IOCs) and YARA rules.
    Maintain updated security software to detect and block malicious activities.
    Be cautious of suspicious emails and attachments, especially those promising pirated content.
    Practice safe browsing habits and avoid clicking on unknown links.

    The discovery of PEAKLIGHT is a strong example of the effectiveness of memory-only techniques to evade detection, as well as the proliferation of malicious payloads through seemingly harmless pirated content and abuse of trusted system processes.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCISCO Requests Reconsideration of UN Convention Against Cybercrime
    Next Article Hardware Backdoor Discovered in RFID Cards Used in Hotels and Offices Worldwide

    Related Posts

    Machine Learning

    Salesforce AI Releases BLIP3-o: A Fully Open-Source Unified Multimodal Model Built with CLIP Embeddings and Flow Matching for Image Understanding and Generation

    May 16, 2025
    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 16, 2025
    Leave A Reply Cancel Reply

    Hostinger

    Continue Reading

    Debunking MongoDB Myths: Security, Scale, and Performance

    Databases

    Google Patches New Android Kernel Vulnerability Exploited in the Wild

    Development

    LLM refusal training easily bypassed with past tense prompts

    Artificial Intelligence

    CVE-2025-4473 – WordPress Frontend Dashboard Plugin Privilege Escalation Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    Google Meet will take notes for you now, thanks to AI

    August 13, 2024

    ‘Take notes for me’ aims to keep track of key meeting points so you can…

    The Rise and Fall of Neumorphism

    January 11, 2025

    FACTS Grounding: A new benchmark for evaluating the factuality of large language models

    December 20, 2024

    CVE-2025-22756 – CVE-2022-47947: Apache HTTP Server Command Injection

    May 14, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.