{"id":25540,"date":"2022-10-18T23:25:59","date_gmt":"2022-10-18T23:25:59","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=25540"},"modified":"2022-10-18T23:26:01","modified_gmt":"2022-10-18T23:26:01","slug":"fully-undetectable-powershell-backdoor","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/","title":{"rendered":"Fully Undetectable PowerShell Backdoor Found by Security Researchers"},"content":{"rendered":"\n<p>SafeBreach Labs researchers recently uncovered a new fully undetectable (FUD) PowerShell backdoor that uses a novel approach to disguise itself as part of the Windows update process.<\/p>\n\n\n\n<p>&#8220;The covert self-developed tool and the associated C2 commands seem to be the work of a sophisticated, unknown threat actor who has targeted approximately 100 victims,&#8221; SafeBreach director of security research Tomer Bar wrote in a <a href=\"https:\/\/www.safebreach.com\/resources\/blog\/safebreach-labs-researchers-uncover-new-fully-undetectable-powershell-backdoor\/\" target=\"_blank\" rel=\"noreferrer noopener\">blog post<\/a> today detailing the findings.<\/p>\n\n\n\n<p>Twitter user @StopMalvertisin, Bar noted, also discovered the attack and <a href=\"https:\/\/twitter.com\/StopMalvertisin\/status\/1562896289981136898\" target=\"_blank\" rel=\"noreferrer noopener\">posted a brief summary<\/a>.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/\" target=\"_blank\" rel=\"noreferrer noopener\">PowerShell Is Source of More Than a Third of Critical Security Threats<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Phishing on LinkedIn<\/h2>\n\n\n\n<p>The attack is launched via a malicious Word document named &#8220;Apply Form.docm,&#8221; created in Jordan on August 25, 2022 (image above). The file&#8217;s metadata includes the phrases &#8220;Linkedin based job application&#8221; and &#8220;Employment \/ Job Application,&#8221; indicating it&#8217;s likely part of a LinkedIn-based <a href=\"https:\/\/www.esecurityplanet.com\/threats\/phishing-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">spear-phishing<\/a> attack.<\/p>\n\n\n\n<p>The document contains a macro code that drops <em>updater.vbs <\/em>and creates a scheduled task, disguised as part of a Windows update, to execute the <em>updater.vbs <\/em>script from a fake update folder.<\/p>\n\n\n\n<p>Before executing the scheduled task, <em>updater.vbs <\/em>creates two PowerShell scripts, <em>Script.ps1 <\/em>and <em>Temp.ps1<\/em>, both obfuscated and fully undetectable. The content of both scripts is stored in text boxes in the Word document.<\/p>\n\n\n\n<p>The first of the two scripts connects to a command and control server to receive commands to be executed along with the victim&#8217;s unique ID. &#8220;When we first tested it, we got ID number 70, which means there were probably 69 victims prior to our test,&#8221; Bar wrote.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/a-few-clicks-from-data-disaster-enterprise-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">A Few Clicks from Data Disaster: The State of Enterprise Security<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Critical Mistake<\/h2>\n\n\n\n<p>That use of a predictable victim ID, Bar noted, was a critical mistake on the threat actor&#8217;s part, making it easy for the researchers to study the attack.<\/p>\n\n\n\n<p>&#8220;We developed a script that pretended to be each victim and recorded the C2 responses (commands) in a pcap file, then ran a second tool we developed to extract the encrypted commands from the pcap,&#8221; he wrote.<\/p>\n\n\n\n<p>After running the command for each victim in sequence, the researchers found the following percentage of commands used for victims thus far:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><em>66%: Exfiltrate process list command<\/em><\/li><li><em>23%: Empty command \u2013 Idle<\/em><\/li><li><em>7%: Local users enumerations \u2013 whoami and whoami \/all + process list<\/em><\/li><li><em>2%: Remove files from public folder + net accounts + computer name, IP configurations<\/em><\/li><li><em>1%: List files in special folders \u2013 program files, downloads, desktop, documents, appdata<\/em><\/li><li><em>1%: Entire script for A.D users enumerations and RDP clients enumerations<\/em><\/li><\/ul>\n\n\n\n<p>Bar&#8217;s blog post includes appendices detailing the associated Indicators of Compromise (IOCs) and PowerShell scripts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Undetectable Threat Bypasses Scanners<\/h2>\n\n\n\n<p>&#8220;Our research team believes this threat is significant based on the fact that it is fully undetectable and was shown to bypass all the security vendors&#8217; scanners under\u00a0<a href=\"http:\/\/virustotal.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">VirusTotal.com<\/a>,&#8221; Bar said by email. &#8220;We strongly recommend that all security teams use the indicators of compromise (IOCs) we identified to better detect and protect themselves against this threat.&#8221;<\/p>\n\n\n\n<p>&#8220;We also suggest that the security mistakes we discovered by this threat actor be used by blue teams in their future digital forensics and incident response (DFIR) investigations,&#8221; he added.<\/p>\n\n\n\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/products\/digital-forensics-software\/\">Best Digital Forensics Tools &amp; Software<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6f9d4d5d5c-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f9d4d5d5c\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f9d4d5d5c\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f9d4d5d5c\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f9d4d5d5c\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f9d4d5d5c\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f9d4d5d5c\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>SafeBreach Labs researchers recently uncovered a new fully undetectable (FUD) PowerShell backdoor that uses a novel approach to disguise itself as part of the Windows update process. &#8220;The covert self-developed tool and the associated C2 commands seem to be the work of a sophisticated, unknown threat actor who has targeted approximately 100 victims,&#8221; SafeBreach director [&hellip;]<\/p>\n","protected":false},"author":166,"featured_media":25542,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[2369,3790,1146,532,3414,730,5277],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[382,31789],"class_list":["post-25540","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-cloud-security","tag-cybersecurity","tag-malware","tag-microsoft","tag-network-security","tag-security","tag-web-security","b2b_audience-awareness-and-consideration","b2b_product-application-security-vulnerability-management","b2b_product-phishing-and-spear-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Fully Undetectable PowerShell Backdoor Found by Security Researchers | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Hackers apparently have launched a LinkedIn spear-phishing campaign that includes an undetectable PowerShell backdoor.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fully Undetectable PowerShell Backdoor Found by Security Researchers | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Hackers apparently have launched a LinkedIn spear-phishing campaign that includes an undetectable PowerShell backdoor.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-18T23:25:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-18T23:26:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/apply-docm.png\" \/>\n\t<meta property=\"og:image:width\" content=\"936\" \/>\n\t<meta property=\"og:image:height\" content=\"708\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Goldman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Goldman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/\"},\"author\":{\"name\":\"Jeff Goldman\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\"},\"headline\":\"Fully Undetectable PowerShell Backdoor Found by Security Researchers\",\"datePublished\":\"2022-10-18T23:25:59+00:00\",\"dateModified\":\"2022-10-18T23:26:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/\"},\"wordCount\":536,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/apply-docm.png\",\"keywords\":[\"cloud security\",\"cybersecurity\",\"malware\",\"Microsoft\",\"network security\",\"security\",\"Web security\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/\",\"name\":\"Fully Undetectable PowerShell Backdoor Found by Security Researchers | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/apply-docm.png\",\"datePublished\":\"2022-10-18T23:25:59+00:00\",\"dateModified\":\"2022-10-18T23:26:01+00:00\",\"description\":\"Hackers apparently have launched a LinkedIn spear-phishing campaign that includes an undetectable PowerShell backdoor.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/apply-docm.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/apply-docm.png\",\"width\":936,\"height\":708},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fully Undetectable PowerShell Backdoor Found by Security Researchers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\",\"name\":\"Jeff Goldman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"caption\":\"Jeff Goldman\"},\"description\":\"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fully Undetectable PowerShell Backdoor Found by Security Researchers | eSecurity Planet","description":"Hackers apparently have launched a LinkedIn spear-phishing campaign that includes an undetectable PowerShell backdoor.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/","og_locale":"en_US","og_type":"article","og_title":"Fully Undetectable PowerShell Backdoor Found by Security Researchers | eSecurity Planet","og_description":"Hackers apparently have launched a LinkedIn spear-phishing campaign that includes an undetectable PowerShell backdoor.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/","og_site_name":"eSecurity Planet","article_published_time":"2022-10-18T23:25:59+00:00","article_modified_time":"2022-10-18T23:26:01+00:00","og_image":[{"width":936,"height":708,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/apply-docm.png","type":"image\/png"}],"author":"Jeff Goldman","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Goldman","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/"},"author":{"name":"Jeff Goldman","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795"},"headline":"Fully Undetectable PowerShell Backdoor Found by Security Researchers","datePublished":"2022-10-18T23:25:59+00:00","dateModified":"2022-10-18T23:26:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/"},"wordCount":536,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/apply-docm.png","keywords":["cloud security","cybersecurity","malware","Microsoft","network security","security","Web security"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/","url":"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/","name":"Fully Undetectable PowerShell Backdoor Found by Security Researchers | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/apply-docm.png","datePublished":"2022-10-18T23:25:59+00:00","dateModified":"2022-10-18T23:26:01+00:00","description":"Hackers apparently have launched a LinkedIn spear-phishing campaign that includes an undetectable PowerShell backdoor.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/apply-docm.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/apply-docm.png","width":936,"height":708},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/fully-undetectable-powershell-backdoor\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Fully Undetectable PowerShell Backdoor Found by Security Researchers"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795","name":"Jeff Goldman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","caption":"Jeff Goldman"},"description":"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.","url":"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25540"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=25540"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25540\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/25542"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=25540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=25540"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=25540"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=25540"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=25540"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=25540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}