Snake Keylogger Evades Windows Defender and Scheduled Tasks to Harvest Login Credentials

A sophisticated phishing campaign targeting Turkish defense and aerospace enterprises has emerged, delivering a highly evasive variant of the Snake Keylogger malware through fraudulent emails impersonating TUSAŞ (Turkish Aerospace Industries). Malwation researchers identified this particular strain during their analysis of recent phishing campaigns, noting the malware’s sophisticated use of legitimate Windows utilities to maintain persistence and evade security controls. Additionally, the malware harvests autofill data, credit card information, download histories, and top sites from compromised systems before exfiltrating the stolen data via SMTP to mail.htcp.homes servers. Simultaneously, the malware creates a scheduled task named “Updates\oNqxPR” using schtasks.exe to ensure automatic execution at system startup. The scheduled task creation process involves generating an XML configuration file that defines the execution parameters, allowing the malware to persist across system reboots without user interaction. Once executed, the malware immediately establishes multiple layers of persistence while simultaneously implementing anti-detection mechanisms to ensure long-term access to victim systems. The malicious campaign distributes files disguised as contractual documents, specifically using the filename “TEKLİF İSTEĞİ – TUSAŞ TÜRK HAVACILIK UZAY SANAYİİ_xlsx.exe” to deceive recipients into executing the payload. The Snake Keylogger variant demonstrates advanced persistence capabilities and sophisticated evasion techniques that allow it to operate undetected within compromised systems. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. This technique leverages legitimate Windows task scheduling functionality, making detection significantly more challenging for traditional security solutions. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. The malware employs a dual-pronged approach to establish persistence while evading detection systems. Upon execution, it immediately invokes PowerShell to add itself to Windows Defender’s exclusion list using the command Add-MpPreference -Excl, effectively neutralizing the built-in antimalware protection. This operation is executed through the NtCreateUserProcess system call, launching powershell.exe with elevated privileges to modify security configurations. Tushar is a Cyber security content editor with a passion for creating captivating and informative content. The keylogger’s primary targets include credentials, cookies, and financial information extracted from over 30 different browsers and email clients, including Chrome, Firefox, Outlook, and Thunderbird. The sample, with SHA256 hash 0cb819d32cb3a2f218c5a17c02bb8c06935e926ebacf1e40a746b01e960c68e4, presents as a PE32 executable written in .NET, utilizing multiple unpacking layers to conceal its true functionality.

This Cyber News was published on cybersecuritynews.com. Publication date: Sat, 19 Jul 2025 12:20:10 +0000


Cyber News related to Snake Keylogger Evades Windows Defender and Scheduled Tasks to Harvest Login Credentials

New SSH-Snake Malware Abuses SSH Credentials - Threat actors abuse SSH credentials to gain unauthorized access to systems and networks. SSH credential abuse provides a stealthy entry point for threat actors to compromise and control the targeted systems. On January 4th, 2024, the Sysdig Threat ...
1 year ago Cybersecuritynews.com
Snake Keylogger Evades Windows Defender and Scheduled Tasks to Harvest Login Credentials - A sophisticated phishing campaign targeting Turkish defense and aerospace enterprises has emerged, delivering a highly evasive variant of the Snake Keylogger malware through fraudulent emails impersonating TUSAŞ (Turkish Aerospace Industries). ...
2 months ago Cybersecuritynews.com
New Snake Keylogger Attacking Chrome, Edge, and Firefox Users - Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Security researchers at Proofpoint have uncovered a sophisticated web inject campaign targeting MacOS users with a new ...
7 months ago Cybersecuritynews.com
Reverse, Reveal, Recover: Windows Defender Quarantine Forensics - Windows Defender places malicious files into quarantine upon detection. Fox-IT's open-source digital forensics and incident response framework Dissect can now recover this metadata, in addition to recovering quarantined files from the Windows ...
1 year ago Blog.fox-it.com
Snake Keyloggers Abuse Java Utilities to Evade Security Tools - A sophisticated phishing campaign leveraging the Snake Keylogger malware has emerged, exploiting legitimate Java debugging utilities to bypass security mechanisms and target organizations worldwide. When executed, the malware utilizes DLL sideloading ...
3 months ago Cybersecuritynews.com
​​Microsoft named as a Leader in three IDC MarketScapes for Modern Endpoint Security 2024 - With these security concerns top of mind, there is no surprise that in the last five years, the Modern Endpoint Security market has nearly tripled in size to defend against emerging, sophisticated, and persistent threats. Microsoft Defender for ...
1 year ago Techcommunity.microsoft.com
IT-Harvest Reaches Milestone With Ingestion of 10K Cybersecurity Products Into Dashboard - PRESS RELEASE. BIRMINGHAM, Mich., March 11, 2024/PRNewswire/ - IT-Harvest, the only provider of comprehensive cybersecurity industry data, is thrilled to announce a significant milestone in its journey. IT-Harvest's industry Dashboard, the company's ...
1 year ago Darkreading.com
Hackers Modifying Registry Keys and Establishing Persistence - Persistence is one of the key things for threat actors to maintain their access to compromised systems and establish connections whenever they require. One of the key methods used to maintain persistence is the use of scheduled tasks. This enables ...
1 year ago Cybersecuritynews.com
Microsoft Defender will isolate undiscovered endpoints to block attacks - Since June 2022, Defender for Endpoint has also been able to isolate hacked and unmanaged Windows devices, blocking all communication to and from the compromised devices to stop attackers from spreading through victims' networks. Microsoft also ...
5 months ago Bleepingcomputer.com
Microsoft deprecates Defender Application Guard for Office - Microsoft is deprecating Defender Application Guard for Office and the Windows Security Isolation APIs, and it recommends Defender for Endpoint attack surface reduction rules, Protected View, and Windows Defender Application Control as an ...
1 year ago Bleepingcomputer.com
Microsoft Defender adds detection of unsecure Wi-Fi networks - If you're not a Microsoft Defender user with a Microsoft 365 Family or Personal subscription, you can also protect yourself by enabling multi-factor authentication on as many of your accounts as possible and turning off automatic Wi-Fi connections to ...
1 year ago Bleepingcomputer.com
Microsoft Copilot for Security provides immediate impact for the Microsoft Defender Experts team - AI is quickly becoming a force multiplier-presenting significant opportunities for security teams to increase productivity, save time, upskill resources, and more. Microsoft Copilot for Security is already showing immediate impact for security teams ...
1 year ago Microsoft.com
Threat Actors Weaponizing Windows Scheduled Tasks for Persistent Attacks - Threat actors are increasingly exploiting Windows Scheduled Tasks as a stealthy and persistent attack vector. This technique allows attackers to maintain long-term access to compromised systems by leveraging built-in Windows functionalities that ...
1 month ago Cybersecuritynews.com
Windows Defender Best Practices - Optimizing Endpoint Protection - Microsoft Defender for Endpoint has emerged as a critical tool in this landscape, offering AI-driven threat detection, automated response, and integration with broader security ecosystems like Microsoft Defender XDR. By combining Defender’s native ...
4 months ago Cybersecuritynews.com
Industrial Defender Risk Signal, a Risk-Based Vulnerability Management Solution for OT Security - PRESS RELEASE. FOXBOROUGH, Mass. , Jan. 3, 2024 /PRNewswire/ - Industrial Defender, the leading provider of OT asset data and cybersecurity solutions for industrial organizations, is excited to announce the launch of the Industrial Defender Risk ...
1 year ago Darkreading.com
Google Gemini AI is getting ChatGPT-like Scheduled Actions feature - Google Gemini is testing a ChatGPT-like scheduled tasks feature called "Scheduled Actions," which will allow you to automate tasks. As spotted by ʟᴇɢɪᴛ on X, Google is integrating a new feature called "Scheduled Actions" ...
5 months ago Bleepingcomputer.com
Top 10 Malware Threats of the Week, April 2025 - A recent analysis by cybersecurity platform ANY.RUN has revealed the top 10 malware threats dominating the digital landscape over the past week, with information stealers Lumma and Snake showing significant increases in activity. The surge in malware ...
5 months ago Cybersecuritynews.com
Shield Your Documents: Introducing DocLink Defender for Real-Time Malware Blockade - Innovative Real-Time Protection: DocLink Defender leverages the latest in analytical technology to intercept and neutralize malicious documents instantly. Proven Defense Against Advanced Threats: Showcasing its prowess, DocLink Defender has a track ...
1 year ago Blog.checkpoint.com
Windows 10 Extended Security Updates Promised for Small Businesses and Home Users - Already common for enterprises, for the first time, individuals will also get the option to pay for extended security updates for a Windows operating system that's out of support. Windows 10 will stop getting free updates, including security fixes, ...
1 year ago Techrepublic.com
Netography Fusion Expands Microsoft Integrations for Greater Context Enrichment and Faster Compromise Detection - We've got great news for companies that have deployed Microsoft security products in their tech stack - the Netography Fusion® Network Defense Platform now ingests context from Microsoft Defender for Endpoint product and the Microsoft Defender XDR ...
1 year ago Securityboulevard.com
Data-theft malware exploits Windows Defender SmartScreen The Register - Criminals are exploiting a Windows Defender SmartScreen bypass vulnerability to infect PCs with Phemedrone Stealer, a malware strain that scans machines for sensitive information - passwords, cookies, authentication tokens, you name it - to grab and ...
1 year ago Go.theregister.com CVE-2023-36025
Microsoft Defender Isolates Compromised Linux Endpoints - Microsoft announced today that it has added device isolation support to Microsoft Defender for Endpoint on Linux devices. Enterprise admins can manually isolate Linux machines enrolled in a public preview using the Microsoft 365 Defender portal or ...
2 years ago Bleepingcomputer.com
​​Microsoft is a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms - It's no secret that ransomware is top of mind for many chief information security officers as the number of attacks has increased exponentially. Scaling device protection and security operations center efficiency by simplifying, automating, and ...
1 year ago Microsoft.com
AI-Powered Rhadamanthys Stealer Targets Crypto Wallets with Image Recognition - Rhadamanthys and Lumma, alongside other stealer malware families like Meduza, StealC, Vidar, and WhiteSnake, have also been found releasing updates in recent weeks to collect cookies from the Chrome web browser, effectively bypassing newly introduced ...
1 year ago Thehackernews.com
New Spear Phishing Attack Delivers VIP Keylogger via EMAIL Attachment - The decrypted payload is then injected into RegSvcs.exe using process hollowing techniques, allowing the VIP keylogger to execute within a legitimate Windows process and evade behavioral detection systems. These files serve distinct purposes in the ...
2 months ago Cybersecuritynews.com

Cyber Trends (last 7 days)