Oh great, hackers found a new way to sneak malware into your computer
Experts catch hackers using Windows event logs to hide malware.
Cybersecurity experts recently discovered a new technique for storing malware on an unsuspecting PC. Used by hackers, it involves slipping malware inside of Windows 11 event logs. To make matters worse, this new technique is designed to make the infection process nearly impossible to detect until it's too late.
Researchers at Kaspersky (thanks Bleeping Computer) analyzed a recent sample of the malware on a customer's computer in February of this year. During their analysis, they found that a hacker was able to plant fileless malware into a victim's file system by hiding it away in your Windows events logs. A first, according to Kaspersky.
This sophisticated attack injects shellcode payloads into Windows event logs into the KMS (Key Management Services) via a custom malware dropper and basically hides in plain sight.
The dropper then loads malicious code by taking advantage of a DLL exploit and hides itself as a copy of a legitimate error file. So, even if you check your event logs, it'll look like nothing out of the ordinary. The attacker can then install a Trojan virus (or, in this case, a number of Trojans), which will wreak havoc on a system.
Denis Legezo, lead security researcher at Kaspersky, told Bleeping Computer that “the actor behind the campaign is rather skilled by itself, or at least has a good set of quite profound commercial tools." The purpose of the attack is to obtain valuable user data.
Best SSD for gaming: the best solid state drives around
Best PCIe 4.0 SSD for gaming: the next gen has landed
The best NVMe SSD: this slivers of SSD goodness
Best external hard drives: expand your horizons
Best external SSDs: plug in upgrades for gaming laptops and consoles
Kaspersky never revealed who the company that was was hit by what it's calling a "targeted campaign." The victim of this attack, in this case, was tricked into downloading a RAR archive from a legitimate file sharing service. Once its downloaded, it secretly runs itself, and you're pretty much screwed.
So how do you defend yourself against an attack like this? You should continue to follow your company's cybersecurity best practices, like never clicking on suspicious links in emails and texts. Ensuring you know what you're downloading, and where it is from, before hitting open on any files or folders remains one of the best defenses we have against the dark hacking arts.
The biggest gaming news, reviews and hardware deals
Keep up to date with the most important stories and the best deals, as picked by the PC Gamer team.
Jorge is a hardware writer from the enchanted lands of New Jersey. When he's not filling the office with the smell of Pop-Tarts, he's reviewing all sorts of gaming hardware, from laptops with the latest mobile GPUs to gaming chairs with built-in back massagers. He's been covering games and tech for over ten years and has written for Dualshockers, WCCFtech, Tom's Guide, and a bunch of other places on the world wide web.