
NEW: Uncover the Latest Cyber Threats!
Stay ahead of evolving cyber threats. Download the H1 2025 Cyberseer SOC Threat Findings Report for insights on AiTM phishing, malware persistence, and more.
"Verification Steps – Press Button Windows+R..."
This simple instruction, appearing on what looked like a legitimate verification screen, launched one of the most common attack chains our security team has encountered this year. Targeting both property and insurance sectors, this attack bypassed traditional security controls through an ingenious social engineering tactic that turned a routine user action into the first step of a complex malware infection.
Most of us are familiar with CAPTCHA challenges - those puzzles asking us to identify traffic lights or type distorted text to prove we're human. But what if a website asked you to complete verification steps by using keyboard commands instead?
This is precisely what made this attack so effective. Users visiting malicious websites were presented with a seemingly legitimate verification challenge. However, instead of the typical image-based verification, they were instructed to ‘paste and run’:
This simple yet deceptive technique bypassed security awareness training that typically warns against downloading and opening files. By having users execute commands through the inbuilt Run dialog, attackers created a false sense of security.
The malicious script executed in the Run dialog appeared legitimate, containing what looked like a verification comment—but was actually downloading and executing malicious files in the background using inbuilt Windows utilities such as ‘PowerShell’ and 'mshta'.
Mshta.exe is a legitimate Windows-native executable specifically designed to run Microsoft HTML Applications (HTA), which can contain embedded Windows Script Host (WSH) code such as VBScript or JScript. It supports execution in a proxy-aware environment, enabling scripts to operate seamlessly across network boundaries. Due to its inherent ability to execute arbitrary script content through a trusted, digitally signed binary, mshta.exe is frequently leveraged by adversaries to proxy malicious code execution. This dual capability—executing WSH scripts embedded within HTML and operating under signed binary trust—makes it a highly effective tool for achieving code execution during both the initial access phase and subsequent stages of the attack lifecycle, often aiding in evasion of traditional security controls.
Once initiated, the attack proceeded through several sophisticated stages:
Figure 2 - Screenshot of the Hidden Payload in the m4a file
This image shows the deceptive .m4a file. At first glance, it looks completely harmless. But when opened in a text or code editor, our team uncovered something far more sinister - AES-encrypted PowerShell, cleverly disguised to evade detection and trigger the next stage of the attack.
This attack technique demonstrates another evolution in social engineering strategies. Rather than relying on traditional email attachments or suspicious downloads, attackers are increasingly leveraging legitimate system functions and user trust to deliver malware.
The malware campaign specifically targeted the property and insurance sectors, exploiting their interconnected supply chains and shared vulnerabilities. This attack highlights how threat actors identify common weaknesses across seemingly unrelated business sectors.
Once established on a system, the malware - identified as a variant of the Vidar information stealer - attempted to harvest sensitive data including:
The malware's communication infrastructure was particularly sophisticated, using legitimate online platforms including Telegram channels and Steam community profiles to disguise command and control communications.
This attack chain highlights several warning signs that organisations should monitor:
Based on our analysis of this attack, we recommend implementing the following security measures:
This attack demonstrates how threat actors continue to innovate, blending social engineering with technical sophistication to bypass security controls. By exploiting the human tendency to follow instructions from seemingly legitimate websites, attackers found a way to execute malicious code through trusted system features.
The incident emphasises the importance of having a robust Microsoft Defender service in place, with all Attack Surface Reduction (ASR) rules properly enabled. These controls, when correctly configured, can block critical components of fileless malware attacks even when traditional detection methods fail.
For organisations concerned about similar threats, our SOC team offers several options to enhance your security posture:
We continue to monitor for new variants of this attack technique and provide detailed threat intelligence to our managed security clients.
Our technical team has prepared a detailed analysis of this malware, including reverse engineering insights, code analysis and indicators of compromise. If you’d like to be notified when this content becomes available, subscribe to our threat intelligence updates.
mshta.exe is a legitimate Windows-native executable used to run Microsoft HTML Applications (HTA). It's often exploited by attackers to run malicious scripts, bypassing security mechanisms.
Stay ahead of evolving cyber threats. Download the H1 2025 Cyberseer SOC Threat Findings Report for insights on AiTM phishing, malware persistence, and more.