Watering Hole Attack Targets EmEditor Users With Information-Stealing Malware
A watering hole attack compromised the EmEditor text editor installer to deliver multistage malware known as Evelyn Stealer. Discovered in late December 2025, the malware uses obfuscated PowerShell scripts and geofencing to selectively target victims, likely originating from Russian threat actors. It steals credentials, disables security features, collects system information, enables lateral movement, and exfiltrates data to a command-and-control server. The attack exploits the software supply chain, emphasizing the need for validating installer integrity and monitoring PowerShell activity. Endpoint telemetry preservation and enforcing least privilege are critical defenses. No CVSS score is assigned, but the attack poses a medium severity risk due to its impact and complexity. European organizations using EmEditor should be vigilant, especially those with critical data and extensive use of this editor. Mitigations include securing download infrastructure, enhanced monitoring, and incident response readiness.
AI Analysis
Technical Summary
This threat involves a sophisticated watering hole attack targeting users of EmEditor, a popular text editor, by compromising its installer in a software supply chain attack discovered in late December 2025. The attackers replaced or injected malicious code into the EmEditor installer, which when executed, deploys multistage malware known as Evelyn Stealer. The malware leverages obfuscated PowerShell scripts to evade detection and uses geofencing techniques to restrict execution to specific geographic regions, indicating a likely Russian origin. Once executed, the malware disables security features such as antivirus or endpoint detection and response tools to maintain persistence and avoid removal. It collects detailed system information, including credentials and other sensitive data, and facilitates lateral movement within the victim’s network to expand its foothold. Data exfiltration is performed by sending stolen information to a remote command-and-control (C2) server. The attack chain demonstrates advanced tactics including credential dumping (T1003.001), system information discovery (T1082), disabling security tools (T1497), and use of obfuscated scripts (T1027). The campaign highlights the risks inherent in software supply chain compromises, where trusted software becomes a vector for malware delivery. The absence of affected version specifics suggests the compromised installer was distributed broadly. Indicators of compromise include multiple file hashes and suspicious domains related to the EmEditor download infrastructure. The attack underscores the importance of validating installer integrity, monitoring PowerShell usage, preserving endpoint telemetry for forensic analysis, and enforcing least privilege principles to limit malware impact. Software publishers are urged to secure their download infrastructure and prepare incident response plans to mitigate such supply chain threats.
Potential Impact
For European organizations, this threat poses significant risks including credential theft, unauthorized access, data exfiltration, and potential disruption of business operations. Organizations relying on EmEditor for text editing and development tasks may inadvertently install compromised software, leading to widespread infection. The malware’s ability to disable security features and move laterally within networks increases the risk of broader compromise, potentially affecting sensitive data confidentiality and system integrity. Data exfiltration to external C2 servers could result in intellectual property loss, regulatory non-compliance (e.g., GDPR violations), and reputational damage. The geofencing technique may limit exposure to certain regions, but European entities remain at risk given the global distribution of EmEditor users. The attack also highlights vulnerabilities in software supply chains, which are critical to many European enterprises. The medium severity rating reflects a balance between the complexity of exploitation and the serious consequences of successful compromise. Organizations in sectors with high data sensitivity, such as finance, government, and critical infrastructure, face elevated risks.
Mitigation Recommendations
1. Verify the integrity of EmEditor installers by checking digital signatures and hashes against official sources before installation or updates. 2. Restrict PowerShell execution policies and monitor PowerShell logs for suspicious or obfuscated script activity, using advanced endpoint detection tools. 3. Preserve comprehensive endpoint telemetry and enable detailed logging to facilitate incident detection and forensic investigations. 4. Enforce least privilege access controls to limit user and application permissions, reducing malware propagation potential. 5. Segment networks to contain lateral movement and isolate critical systems. 6. Employ multi-factor authentication to protect credentials and reduce the impact of credential theft. 7. Regularly update and patch all software, including EmEditor, once clean versions are available. 8. Secure software download infrastructure by implementing strong access controls, monitoring for unauthorized changes, and using secure delivery mechanisms such as code signing and trusted repositories. 9. Develop and rehearse incident response plans specifically addressing supply chain compromise scenarios. 10. Educate users about the risks of downloading software from unofficial sources and the importance of verifying software authenticity.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- hash: 57bc24f923c92fc600c2ad47fe285074
- hash: 6a4554509ce27efe5c6b8e58431f60d8
- hash: a27731876e769ff19e225700085967bf
- hash: 65b0853abb656c6cc342d87b872fbe21482e9bae
- hash: 81e1ccbd3b4ed5a7593cfba21315c65ad4635f73
- hash: 826af8619430e7363e9eb3b2395b36cf6365b7bd
- hash: 938325004e44ab1a65e948b4d07b05229309f630
- hash: a3ab5e58a9330dd673dec17777e5110bf3c9eba3
- hash: e5678fd66ac09205f55dc4fae9601185a76b2f50
- hash: ff78a86746bdcc6ed1390ff291a6c599e96e8487
- hash: 3d1763b037e66bbde222125a21b23fc24abd76ebab40589748ac69e2f37c27fc
- hash: 4bea333d3d2f2a32018cd6afe742c3b25bfcc6bfe8963179dad3940305b13c98
- hash: da59acc764bbd6b576bef6b1b9038f592ad4df0eed894b0fbd3931f733622a1a
- domain: cachingdrive.com
- domain: emeditorde.com
- domain: emeditorgb.com
- domain: emeditorjp.com
Watering Hole Attack Targets EmEditor Users With Information-Stealing Malware
Description
A watering hole attack compromised the EmEditor text editor installer to deliver multistage malware known as Evelyn Stealer. Discovered in late December 2025, the malware uses obfuscated PowerShell scripts and geofencing to selectively target victims, likely originating from Russian threat actors. It steals credentials, disables security features, collects system information, enables lateral movement, and exfiltrates data to a command-and-control server. The attack exploits the software supply chain, emphasizing the need for validating installer integrity and monitoring PowerShell activity. Endpoint telemetry preservation and enforcing least privilege are critical defenses. No CVSS score is assigned, but the attack poses a medium severity risk due to its impact and complexity. European organizations using EmEditor should be vigilant, especially those with critical data and extensive use of this editor. Mitigations include securing download infrastructure, enhanced monitoring, and incident response readiness.
AI-Powered Analysis
Technical Analysis
This threat involves a sophisticated watering hole attack targeting users of EmEditor, a popular text editor, by compromising its installer in a software supply chain attack discovered in late December 2025. The attackers replaced or injected malicious code into the EmEditor installer, which when executed, deploys multistage malware known as Evelyn Stealer. The malware leverages obfuscated PowerShell scripts to evade detection and uses geofencing techniques to restrict execution to specific geographic regions, indicating a likely Russian origin. Once executed, the malware disables security features such as antivirus or endpoint detection and response tools to maintain persistence and avoid removal. It collects detailed system information, including credentials and other sensitive data, and facilitates lateral movement within the victim’s network to expand its foothold. Data exfiltration is performed by sending stolen information to a remote command-and-control (C2) server. The attack chain demonstrates advanced tactics including credential dumping (T1003.001), system information discovery (T1082), disabling security tools (T1497), and use of obfuscated scripts (T1027). The campaign highlights the risks inherent in software supply chain compromises, where trusted software becomes a vector for malware delivery. The absence of affected version specifics suggests the compromised installer was distributed broadly. Indicators of compromise include multiple file hashes and suspicious domains related to the EmEditor download infrastructure. The attack underscores the importance of validating installer integrity, monitoring PowerShell usage, preserving endpoint telemetry for forensic analysis, and enforcing least privilege principles to limit malware impact. Software publishers are urged to secure their download infrastructure and prepare incident response plans to mitigate such supply chain threats.
Potential Impact
For European organizations, this threat poses significant risks including credential theft, unauthorized access, data exfiltration, and potential disruption of business operations. Organizations relying on EmEditor for text editing and development tasks may inadvertently install compromised software, leading to widespread infection. The malware’s ability to disable security features and move laterally within networks increases the risk of broader compromise, potentially affecting sensitive data confidentiality and system integrity. Data exfiltration to external C2 servers could result in intellectual property loss, regulatory non-compliance (e.g., GDPR violations), and reputational damage. The geofencing technique may limit exposure to certain regions, but European entities remain at risk given the global distribution of EmEditor users. The attack also highlights vulnerabilities in software supply chains, which are critical to many European enterprises. The medium severity rating reflects a balance between the complexity of exploitation and the serious consequences of successful compromise. Organizations in sectors with high data sensitivity, such as finance, government, and critical infrastructure, face elevated risks.
Mitigation Recommendations
1. Verify the integrity of EmEditor installers by checking digital signatures and hashes against official sources before installation or updates. 2. Restrict PowerShell execution policies and monitor PowerShell logs for suspicious or obfuscated script activity, using advanced endpoint detection tools. 3. Preserve comprehensive endpoint telemetry and enable detailed logging to facilitate incident detection and forensic investigations. 4. Enforce least privilege access controls to limit user and application permissions, reducing malware propagation potential. 5. Segment networks to contain lateral movement and isolate critical systems. 6. Employ multi-factor authentication to protect credentials and reduce the impact of credential theft. 7. Regularly update and patch all software, including EmEditor, once clean versions are available. 8. Secure software download infrastructure by implementing strong access controls, monitoring for unauthorized changes, and using secure delivery mechanisms such as code signing and trusted repositories. 9. Develop and rehearse incident response plans specifically addressing supply chain compromise scenarios. 10. Educate users about the risks of downloading software from unofficial sources and the importance of verifying software authenticity.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.trendmicro.com/en_us/research/26/a/watering-hole-attack-targets-emeditor-users.html"]
- Adversary
- null
- Pulse Id
- 69735fdc6006a7c4a9748eb3
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash57bc24f923c92fc600c2ad47fe285074 | — | |
hash6a4554509ce27efe5c6b8e58431f60d8 | — | |
hasha27731876e769ff19e225700085967bf | — | |
hash65b0853abb656c6cc342d87b872fbe21482e9bae | — | |
hash81e1ccbd3b4ed5a7593cfba21315c65ad4635f73 | — | |
hash826af8619430e7363e9eb3b2395b36cf6365b7bd | — | |
hash938325004e44ab1a65e948b4d07b05229309f630 | — | |
hasha3ab5e58a9330dd673dec17777e5110bf3c9eba3 | — | |
hashe5678fd66ac09205f55dc4fae9601185a76b2f50 | — | |
hashff78a86746bdcc6ed1390ff291a6c599e96e8487 | — | |
hash3d1763b037e66bbde222125a21b23fc24abd76ebab40589748ac69e2f37c27fc | — | |
hash4bea333d3d2f2a32018cd6afe742c3b25bfcc6bfe8963179dad3940305b13c98 | — | |
hashda59acc764bbd6b576bef6b1b9038f592ad4df0eed894b0fbd3931f733622a1a | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaincachingdrive.com | — | |
domainemeditorde.com | — | |
domainemeditorgb.com | — | |
domainemeditorjp.com | — |
Threat ID: 6973fed44623b1157c68862a
Added to database: 1/23/2026, 11:05:56 PM
Last enriched: 1/23/2026, 11:20:22 PM
Last updated: 1/24/2026, 7:35:45 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Sandworm behind cyberattack on Poland's power grid in late 2025
MediumRestless Spirit: New Attacks on Russian Companies
MediumTracking the VS Code Tasks Infection Vector
MediumOsiris: New Ransomware, Experienced Attackers?
MediumI scan, you scan, we all scan for... knowledge?
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.