Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Watering Hole Attack Targets EmEditor Users With Information-Stealing Malware

0
Medium
Published: Fri Jan 23 2026 (01/23/2026, 11:47:40 UTC)
Source: AlienVault OTX General

Description

A watering hole attack compromised the EmEditor text editor installer to deliver multistage malware known as Evelyn Stealer. Discovered in late December 2025, the malware uses obfuscated PowerShell scripts and geofencing to selectively target victims, likely originating from Russian threat actors. It steals credentials, disables security features, collects system information, enables lateral movement, and exfiltrates data to a command-and-control server. The attack exploits the software supply chain, emphasizing the need for validating installer integrity and monitoring PowerShell activity. Endpoint telemetry preservation and enforcing least privilege are critical defenses. No CVSS score is assigned, but the attack poses a medium severity risk due to its impact and complexity. European organizations using EmEditor should be vigilant, especially those with critical data and extensive use of this editor. Mitigations include securing download infrastructure, enhanced monitoring, and incident response readiness.

AI-Powered Analysis

AILast updated: 01/23/2026, 23:20:22 UTC

Technical Analysis

This threat involves a sophisticated watering hole attack targeting users of EmEditor, a popular text editor, by compromising its installer in a software supply chain attack discovered in late December 2025. The attackers replaced or injected malicious code into the EmEditor installer, which when executed, deploys multistage malware known as Evelyn Stealer. The malware leverages obfuscated PowerShell scripts to evade detection and uses geofencing techniques to restrict execution to specific geographic regions, indicating a likely Russian origin. Once executed, the malware disables security features such as antivirus or endpoint detection and response tools to maintain persistence and avoid removal. It collects detailed system information, including credentials and other sensitive data, and facilitates lateral movement within the victim’s network to expand its foothold. Data exfiltration is performed by sending stolen information to a remote command-and-control (C2) server. The attack chain demonstrates advanced tactics including credential dumping (T1003.001), system information discovery (T1082), disabling security tools (T1497), and use of obfuscated scripts (T1027). The campaign highlights the risks inherent in software supply chain compromises, where trusted software becomes a vector for malware delivery. The absence of affected version specifics suggests the compromised installer was distributed broadly. Indicators of compromise include multiple file hashes and suspicious domains related to the EmEditor download infrastructure. The attack underscores the importance of validating installer integrity, monitoring PowerShell usage, preserving endpoint telemetry for forensic analysis, and enforcing least privilege principles to limit malware impact. Software publishers are urged to secure their download infrastructure and prepare incident response plans to mitigate such supply chain threats.

Potential Impact

For European organizations, this threat poses significant risks including credential theft, unauthorized access, data exfiltration, and potential disruption of business operations. Organizations relying on EmEditor for text editing and development tasks may inadvertently install compromised software, leading to widespread infection. The malware’s ability to disable security features and move laterally within networks increases the risk of broader compromise, potentially affecting sensitive data confidentiality and system integrity. Data exfiltration to external C2 servers could result in intellectual property loss, regulatory non-compliance (e.g., GDPR violations), and reputational damage. The geofencing technique may limit exposure to certain regions, but European entities remain at risk given the global distribution of EmEditor users. The attack also highlights vulnerabilities in software supply chains, which are critical to many European enterprises. The medium severity rating reflects a balance between the complexity of exploitation and the serious consequences of successful compromise. Organizations in sectors with high data sensitivity, such as finance, government, and critical infrastructure, face elevated risks.

Mitigation Recommendations

1. Verify the integrity of EmEditor installers by checking digital signatures and hashes against official sources before installation or updates. 2. Restrict PowerShell execution policies and monitor PowerShell logs for suspicious or obfuscated script activity, using advanced endpoint detection tools. 3. Preserve comprehensive endpoint telemetry and enable detailed logging to facilitate incident detection and forensic investigations. 4. Enforce least privilege access controls to limit user and application permissions, reducing malware propagation potential. 5. Segment networks to contain lateral movement and isolate critical systems. 6. Employ multi-factor authentication to protect credentials and reduce the impact of credential theft. 7. Regularly update and patch all software, including EmEditor, once clean versions are available. 8. Secure software download infrastructure by implementing strong access controls, monitoring for unauthorized changes, and using secure delivery mechanisms such as code signing and trusted repositories. 9. Develop and rehearse incident response plans specifically addressing supply chain compromise scenarios. 10. Educate users about the risks of downloading software from unofficial sources and the importance of verifying software authenticity.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.trendmicro.com/en_us/research/26/a/watering-hole-attack-targets-emeditor-users.html"]
Adversary
null
Pulse Id
69735fdc6006a7c4a9748eb3
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash57bc24f923c92fc600c2ad47fe285074
hash6a4554509ce27efe5c6b8e58431f60d8
hasha27731876e769ff19e225700085967bf
hash65b0853abb656c6cc342d87b872fbe21482e9bae
hash81e1ccbd3b4ed5a7593cfba21315c65ad4635f73
hash826af8619430e7363e9eb3b2395b36cf6365b7bd
hash938325004e44ab1a65e948b4d07b05229309f630
hasha3ab5e58a9330dd673dec17777e5110bf3c9eba3
hashe5678fd66ac09205f55dc4fae9601185a76b2f50
hashff78a86746bdcc6ed1390ff291a6c599e96e8487
hash3d1763b037e66bbde222125a21b23fc24abd76ebab40589748ac69e2f37c27fc
hash4bea333d3d2f2a32018cd6afe742c3b25bfcc6bfe8963179dad3940305b13c98
hashda59acc764bbd6b576bef6b1b9038f592ad4df0eed894b0fbd3931f733622a1a

Domain

ValueDescriptionCopy
domaincachingdrive.com
domainemeditorde.com
domainemeditorgb.com
domainemeditorjp.com

Threat ID: 6973fed44623b1157c68862a

Added to database: 1/23/2026, 11:05:56 PM

Last enriched: 1/23/2026, 11:20:22 PM

Last updated: 1/24/2026, 7:35:45 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats