Saturday, April 12, 2025
HomeCyber Security NewsBeware WARMCOOKIE Backdoor Knocking Your Inbox

Beware WARMCOOKIE Backdoor Knocking Your Inbox

Published on

SIEM as a Service

Follow Us on Google News

WARMCOOKIE is a new Windows backdoor that is deployed by a phishing effort with a recruiting theme dubbed REF6127.

The WARMCOOKIE backdoor can be used to take screenshots of the target computer, deliver additional payloads, and fingerprint a system.

“This malware represents a formidable threat that provides the capability to access target environments and push additional types of malware down to victims”, Elastic Security Labs shared with Cyber Security News.

- Advertisement - Google News

WARMCOOKIE Execution Flow

Researchers have been observing phishing efforts that use lures associated with recruitment firms since late April 2024.

Free Webinar on API vulnerability scanning for OWASP API Top 10 vulnerabilities -> Book Your Spot.

By addressing recipients by name and their present employer, these emails enticed them to look for new employment by clicking on a link that would take them to an internal system where they could read a job description.

Phishing email – Subject: “We’re Interested”

After clicking, users are taken to a landing page that appears to be an authentic website that was created only for them. 

There, they must complete a CAPTCHA test to download a document. The landing pages, which mention a new variation of URSNIF, are similar to earlier campaigns that Google Cloud’s security team has identified.

WARMCOOKIE attack flow

When the CAPTCHA is solved, an obfuscated JavaScript file is downloaded from the page. This obfuscated script launches PowerShell, initiating the initial task to load WARMCOOKIE.

The PowerShell script uses the Background Intelligent Transfer Service (BITS) to download WARMCOOKIE and launch the DLL. 

Researchers note that 45.9.74[.]135 is the IP address where the threat actor continuously and swiftly creates new landing pages.

The actor made an effort to target several hiring agencies while combining industry-related keywords.

Domains associated with 45.9.74[.]135

The backdoor gathers the following values before sending its first outgoing network request, and they are used to identify and fingerprint the target system.

  • Volume serial number
  • DNS domain of the victim machine
  • Computer name
  • Username

In particular, the malware that can take screenshots from victims’ computers offers a variety of harmful possibilities, like making use of private data that is visible on the screen or keeping a close eye on the victim’s computer. 

Screen capture

According to analysts, threat actors create new infrastructure and domains every week to support these campaigns.

“While there is room for improvement on the malware development side, we believe these minor issues will be addressed over time,” researchers conclude.

Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...