Active Exploitation of CVE–2023–36025 Unveils New Malware – Phemedrone Stealer

In a concerning development, cybersecurity experts have recently uncovered the active exploitation of a critical vulnerability, CVE-2023-36025, which has led to the dissemination of a new strain of malware called Phemedrone Stealer. These findings highlight the ever-present threats faced by individuals and organizations in the digital landscape.

Malware functionality

Phemedrone Stealer is a malicious software explicitly designed to target web browsers and collect sensitive data from cryptocurrency wallets and popular messaging applications such as Telegram, Steam, and Discord. This highly sophisticated malware not only retrieves private information but also gathers system details, including hardware information and location. The stolen data is subsequently transmitted to the attackers either through Telegram or their command-and-control server.

Impact of Vulnerability

The vulnerability in question lies within Microsoft Windows Defender SmartScreen, a security feature that aims to protect users from potentially malicious websites and downloads. The flaw arises from inadequate checks on Internet Shortcut (.url) files, leaving a glaring opening for threat actors to exploit.

Bypassing Windows Defender SmartScreen

To circumvent Windows Defender SmartScreen warnings, threat actors have been employing a clever technique. They create .url files that appear harmless but actually download and execute malicious scripts unnoticed. This deceptive approach allows attackers to deliver the Phemedrone Stealer malware without triggering any security alerts.

Microsoft’s response

Promptly addressing the severity of the situation, Microsoft released a security update on November 14, 2023, to patch the vulnerability. Recognizing the gravity of the issue, the Cybersecurity and Infrastructure Security Agency (CISA) promptly added this vulnerability to their Known Exploited Vulnerabilities (KEV) list.

Incorporation into malware campaigns

There is strong evidence to suggest that various malware campaigns, including those distributing the Phemedrone Stealer payload, have capitalized on the vulnerability provided by CVE-2023-36025. This integration into the attack chains of different malware campaigns poses a significant threat to unsuspecting users and organizations.

Attack vector

The primary method employed by threat actors involves hosting malicious .url files on cloud services. Platforms such as Discord and FileTransfer.io have unwittingly become hosts for these harmful files. To further mask their intentions, attackers often use URL shorteners to disguise the true nature of these files, making them more enticing to unsuspecting victims.

Malware Execution and Persistence

When the malicious .url file exploiting CVE-2023-36025 is executed, the Phemedrone Stealer malware deploys defense evasion techniques to maintain its presence and effectiveness. It achieves persistence by creating scheduled tasks within the system and utilizes an encrypted second-stage loader. These measures ensure that the malware remains active and undetected for an extended period, enabling attackers to continue their nefarious activities.

Continued exploitation

Despite Microsoft’s efforts to combat the vulnerability, threat actors continue to exploit this flaw, underscoring the need for constant vigilance and the importance of promptly updating Windows installations. Organizations, in particular, must recognize this ongoing threat and take immediate action to secure their systems against potential cyberattacks.

The active exploitation of CVE-2023-36025 has led to the emergence of a new malware variant called Phemedrone Stealer, which specifically targets web browsers and collects sensitive data. The vulnerability in Microsoft Windows Defender SmartScreen has provided threat actors with an opportunity to exploit unsuspecting users. While Microsoft has released a patch, the continued exploitation of this vulnerability highlights the need for proactive security measures and timely updates to protect against evolving threats. It is crucial for individuals and organizations to stay informed, remain vigilant, and maintain a robust cybersecurity posture in today’s increasingly complex digital landscape.

Explore more

A Beginner’s Guide to Data Engineering and DataOps for 2026

While the public often celebrates the triumphs of artificial intelligence and predictive modeling, these high-level insights depend entirely on a hidden, gargantuan plumbing system that keeps data flowing, clean, and accessible. In the current landscape, the realization has settled across the corporate world that a data scientist without a data engineer is like a master chef in a kitchen with

Ethereum Adopts ERC-7730 to Replace Risky Blind Signing

For years, the experience of interacting with decentralized applications on the Ethereum blockchain has been fraught with a precarious and dangerous uncertainty known as blind signing. Every time a user attempted to swap tokens or provide liquidity, their hardware or software wallet would present them with a wall of incomprehensible hexadecimal code, essentially asking them to authorize a financial transaction

Germany Funds KDE to Boost Linux as Windows Alternative

The decision by the German government to allocate a 1.3 million euro grant to the KDE community marks a definitive shift in how European nations view the long-standing dominance of proprietary operating systems like Windows and macOS. This financial injection, facilitated by the Sovereign Tech Fund, serves as a high-stakes investment in the concept of digital sovereignty, aiming to provide

Why Is This $20 Windows 11 Pro and Training Bundle a Steal?

Navigating the complexities of modern computing requires more than just high-end hardware; it demands an operating system that integrates seamlessly with artificial intelligence while providing robust security for sensitive personal and professional data. As of 2026, many users still find themselves tethered to aging software environments that struggle to keep pace with the rapid advancements in cloud computing and data

Notion Launches Developer Platform for AI Agent Management

The modern enterprise currently grapples with an overwhelming explosion of disconnected software tools that fragment critical information and stall meaningful productivity across entire departments. While the shift toward artificial intelligence promised to streamline these disparate workflows, the reality has often resulted in a chaotic landscape where specialized agents lack the necessary context to perform high-stakes tasks autonomously. Organizations frequently find