EmEditor Homepage Download Button Served Malware for 4 Days
Between December 19-22, 2025, EmEditor's official website suffered a security breach, causing the main download button to serve malicious software. The fake installer, signed by WALSHAM INVESTMENTS LIMITED, contained infostealer malware targeting login credentials, browser history, and VPN settings. It specifically targeted technical staff and government offices, stealing files and installing a fraudulent browser extension for remote control and cryptocurrency address swapping. Users who downloaded during this period are advised to check the digital signature, delete suspicious files, and change stored passwords. Emurasoft is investigating the incident and has apologized for the inconvenience.
AI Analysis
Technical Summary
This threat involves a supply chain compromise of EmEditor's official website, where attackers gained access and replaced the legitimate download link with a malicious installer for a four-day period in December 2025. The fake installer was digitally signed by an entity named WALSHAM INVESTMENTS LIMITED, likely to evade detection and appear trustworthy. The malware payload is an infostealer designed to harvest sensitive data such as login credentials, browser history, and VPN configurations. It specifically targeted technical personnel and government offices, indicating a strategic focus on high-value targets. Additionally, the malware installed a fraudulent browser extension that provided remote control capabilities and manipulated cryptocurrency addresses to redirect transactions to attacker-controlled wallets. The infection chain required victims to download and run the compromised installer, but no further user interaction was necessary for the malware to execute its payload. The attack utilized multiple MITRE ATT&CK techniques including credential access (T1113), user execution (T1204.002), command and control (T1071), data from local system (T1005), execution through scripting (T1059), remote services (T1102), valid accounts (T1078), and persistence via browser extensions (T1573). Although no CVE or known exploit campaigns have been linked to this incident, the breach underscores the risks of website compromises and the importance of supply chain security. Emurasoft is currently investigating and has advised users to verify digital signatures, remove suspicious files, and update credentials to mitigate impact.
Potential Impact
European organizations, especially government offices and technical staff who rely on EmEditor for text editing, are at significant risk from this incident. The malware's ability to steal credentials and VPN settings threatens confidentiality and could enable lateral movement within networks. The fraudulent browser extension's remote control capability and cryptocurrency address manipulation pose risks to operational integrity and financial assets. Compromise of VPN credentials could allow attackers to bypass perimeter defenses, increasing exposure to sensitive systems. The targeted nature of the attack against government and technical personnel suggests potential espionage or sabotage motives, which could have broader national security implications. The incident also undermines trust in software supply chains and highlights the need for stringent verification processes. Organizations that downloaded EmEditor during the affected period may face data breaches, unauthorized access, and financial losses. The medium severity rating reflects the targeted scope and complexity of the attack, but the potential for significant damage in critical sectors elevates its importance for European entities.
Mitigation Recommendations
European organizations should immediately verify the digital signatures of any EmEditor installers downloaded between December 19-22, 2025, ensuring they are signed by Emurasoft rather than WALSHAM INVESTMENTS LIMITED. Any suspicious or unsigned files should be deleted promptly. Users must change all stored passwords, especially for VPNs, email, and other critical services. Network defenders should monitor for indicators of compromise, including the provided file hashes, unusual browser extension installations, and anomalous remote control activity. Endpoint detection and response (EDR) tools should be employed to detect infostealer behaviors and unauthorized persistence mechanisms. Organizations should conduct thorough audits of affected systems for signs of data exfiltration or lateral movement. Enhancing supply chain security by implementing code signing verification, website integrity monitoring, and multi-factor authentication for website administration can prevent similar future incidents. Additionally, educating users about verifying download sources and digital signatures will reduce the risk of executing malicious installers. Incident response plans should be updated to include supply chain compromise scenarios.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland
Indicators of Compromise
- hash: 43b5de7bba443f9af69b1cc0691d5172
- hash: 6cc9aabfc48fa8338f72520433c89e80e895f706
- hash: e5f9c1e9b586b59712cefa834b67f829ccbed183c6855040e6d42f0c0c3fcb3e
EmEditor Homepage Download Button Served Malware for 4 Days
Description
Between December 19-22, 2025, EmEditor's official website suffered a security breach, causing the main download button to serve malicious software. The fake installer, signed by WALSHAM INVESTMENTS LIMITED, contained infostealer malware targeting login credentials, browser history, and VPN settings. It specifically targeted technical staff and government offices, stealing files and installing a fraudulent browser extension for remote control and cryptocurrency address swapping. Users who downloaded during this period are advised to check the digital signature, delete suspicious files, and change stored passwords. Emurasoft is investigating the incident and has apologized for the inconvenience.
AI-Powered Analysis
Technical Analysis
This threat involves a supply chain compromise of EmEditor's official website, where attackers gained access and replaced the legitimate download link with a malicious installer for a four-day period in December 2025. The fake installer was digitally signed by an entity named WALSHAM INVESTMENTS LIMITED, likely to evade detection and appear trustworthy. The malware payload is an infostealer designed to harvest sensitive data such as login credentials, browser history, and VPN configurations. It specifically targeted technical personnel and government offices, indicating a strategic focus on high-value targets. Additionally, the malware installed a fraudulent browser extension that provided remote control capabilities and manipulated cryptocurrency addresses to redirect transactions to attacker-controlled wallets. The infection chain required victims to download and run the compromised installer, but no further user interaction was necessary for the malware to execute its payload. The attack utilized multiple MITRE ATT&CK techniques including credential access (T1113), user execution (T1204.002), command and control (T1071), data from local system (T1005), execution through scripting (T1059), remote services (T1102), valid accounts (T1078), and persistence via browser extensions (T1573). Although no CVE or known exploit campaigns have been linked to this incident, the breach underscores the risks of website compromises and the importance of supply chain security. Emurasoft is currently investigating and has advised users to verify digital signatures, remove suspicious files, and update credentials to mitigate impact.
Potential Impact
European organizations, especially government offices and technical staff who rely on EmEditor for text editing, are at significant risk from this incident. The malware's ability to steal credentials and VPN settings threatens confidentiality and could enable lateral movement within networks. The fraudulent browser extension's remote control capability and cryptocurrency address manipulation pose risks to operational integrity and financial assets. Compromise of VPN credentials could allow attackers to bypass perimeter defenses, increasing exposure to sensitive systems. The targeted nature of the attack against government and technical personnel suggests potential espionage or sabotage motives, which could have broader national security implications. The incident also undermines trust in software supply chains and highlights the need for stringent verification processes. Organizations that downloaded EmEditor during the affected period may face data breaches, unauthorized access, and financial losses. The medium severity rating reflects the targeted scope and complexity of the attack, but the potential for significant damage in critical sectors elevates its importance for European entities.
Mitigation Recommendations
European organizations should immediately verify the digital signatures of any EmEditor installers downloaded between December 19-22, 2025, ensuring they are signed by Emurasoft rather than WALSHAM INVESTMENTS LIMITED. Any suspicious or unsigned files should be deleted promptly. Users must change all stored passwords, especially for VPNs, email, and other critical services. Network defenders should monitor for indicators of compromise, including the provided file hashes, unusual browser extension installations, and anomalous remote control activity. Endpoint detection and response (EDR) tools should be employed to detect infostealer behaviors and unauthorized persistence mechanisms. Organizations should conduct thorough audits of affected systems for signs of data exfiltration or lateral movement. Enhancing supply chain security by implementing code signing verification, website integrity monitoring, and multi-factor authentication for website administration can prevent similar future incidents. Additionally, educating users about verifying download sources and digital signatures will reduce the risk of executing malicious installers. Incident response plans should be updated to include supply chain compromise scenarios.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://hackread.com/emeditor-homepage-download-button-malware"]
- Adversary
- null
- Pulse Id
- 6954047d8a63acca030bd5e8
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash43b5de7bba443f9af69b1cc0691d5172 | — | |
hash6cc9aabfc48fa8338f72520433c89e80e895f706 | — | |
hashe5f9c1e9b586b59712cefa834b67f829ccbed183c6855040e6d42f0c0c3fcb3e | — |
Threat ID: 69544fc0db813ff03e2ae6fa
Added to database: 12/30/2025, 10:18:40 PM
Last enriched: 12/30/2025, 10:18:55 PM
Last updated: 2/7/2026, 12:36:35 AM
Views: 344
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Technical Analysis of Marco Stealer
MediumNew Clickfix variant 'CrashFix' deploying Python Remote Access Trojan
MediumKnife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework
MediumThey Got In Through SonicWall. Then They Tried to Kill Every Security Tool
MediumHundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.