Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

EmEditor Homepage Download Button Served Malware for 4 Days

0
Medium
Published: Tue Dec 30 2025 (12/30/2025, 16:57:33 UTC)
Source: AlienVault OTX General

Description

Between December 19-22, 2025, EmEditor's official website suffered a security breach, causing the main download button to serve malicious software. The fake installer, signed by WALSHAM INVESTMENTS LIMITED, contained infostealer malware targeting login credentials, browser history, and VPN settings. It specifically targeted technical staff and government offices, stealing files and installing a fraudulent browser extension for remote control and cryptocurrency address swapping. Users who downloaded during this period are advised to check the digital signature, delete suspicious files, and change stored passwords. Emurasoft is investigating the incident and has apologized for the inconvenience.

AI-Powered Analysis

AILast updated: 12/30/2025, 22:18:55 UTC

Technical Analysis

This threat involves a supply chain compromise of EmEditor's official website, where attackers gained access and replaced the legitimate download link with a malicious installer for a four-day period in December 2025. The fake installer was digitally signed by an entity named WALSHAM INVESTMENTS LIMITED, likely to evade detection and appear trustworthy. The malware payload is an infostealer designed to harvest sensitive data such as login credentials, browser history, and VPN configurations. It specifically targeted technical personnel and government offices, indicating a strategic focus on high-value targets. Additionally, the malware installed a fraudulent browser extension that provided remote control capabilities and manipulated cryptocurrency addresses to redirect transactions to attacker-controlled wallets. The infection chain required victims to download and run the compromised installer, but no further user interaction was necessary for the malware to execute its payload. The attack utilized multiple MITRE ATT&CK techniques including credential access (T1113), user execution (T1204.002), command and control (T1071), data from local system (T1005), execution through scripting (T1059), remote services (T1102), valid accounts (T1078), and persistence via browser extensions (T1573). Although no CVE or known exploit campaigns have been linked to this incident, the breach underscores the risks of website compromises and the importance of supply chain security. Emurasoft is currently investigating and has advised users to verify digital signatures, remove suspicious files, and update credentials to mitigate impact.

Potential Impact

European organizations, especially government offices and technical staff who rely on EmEditor for text editing, are at significant risk from this incident. The malware's ability to steal credentials and VPN settings threatens confidentiality and could enable lateral movement within networks. The fraudulent browser extension's remote control capability and cryptocurrency address manipulation pose risks to operational integrity and financial assets. Compromise of VPN credentials could allow attackers to bypass perimeter defenses, increasing exposure to sensitive systems. The targeted nature of the attack against government and technical personnel suggests potential espionage or sabotage motives, which could have broader national security implications. The incident also undermines trust in software supply chains and highlights the need for stringent verification processes. Organizations that downloaded EmEditor during the affected period may face data breaches, unauthorized access, and financial losses. The medium severity rating reflects the targeted scope and complexity of the attack, but the potential for significant damage in critical sectors elevates its importance for European entities.

Mitigation Recommendations

European organizations should immediately verify the digital signatures of any EmEditor installers downloaded between December 19-22, 2025, ensuring they are signed by Emurasoft rather than WALSHAM INVESTMENTS LIMITED. Any suspicious or unsigned files should be deleted promptly. Users must change all stored passwords, especially for VPNs, email, and other critical services. Network defenders should monitor for indicators of compromise, including the provided file hashes, unusual browser extension installations, and anomalous remote control activity. Endpoint detection and response (EDR) tools should be employed to detect infostealer behaviors and unauthorized persistence mechanisms. Organizations should conduct thorough audits of affected systems for signs of data exfiltration or lateral movement. Enhancing supply chain security by implementing code signing verification, website integrity monitoring, and multi-factor authentication for website administration can prevent similar future incidents. Additionally, educating users about verifying download sources and digital signatures will reduce the risk of executing malicious installers. Incident response plans should be updated to include supply chain compromise scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://hackread.com/emeditor-homepage-download-button-malware"]
Adversary
null
Pulse Id
6954047d8a63acca030bd5e8
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash43b5de7bba443f9af69b1cc0691d5172
hash6cc9aabfc48fa8338f72520433c89e80e895f706
hashe5f9c1e9b586b59712cefa834b67f829ccbed183c6855040e6d42f0c0c3fcb3e

Threat ID: 69544fc0db813ff03e2ae6fa

Added to database: 12/30/2025, 10:18:40 PM

Last enriched: 12/30/2025, 10:18:55 PM

Last updated: 2/7/2026, 12:36:35 AM

Views: 344

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats