What to Know About Peaklight: New Stealth Malware Targets Illegal Movie Downloads

When downloading illegal media, there's always a risk that you'll end up downloading more than you bargained for. Malware developers love to attach their malware to fake media files to trick people into downloading them.

Now, a new attack called Peaklight is going viral and targeting people who download movies illegally.

What is Peaklight?

What to Know About Peaklight: New Stealth Malware Targets Illegal Movie Downloads
An example of Peaklight code

Peaklight is a malicious application – but it can’t cause any damage on its own. Instead, it acts as a downloader that installs damaging processes onto your PC. If you imagine Peaklight as a gun and the bullets it fires as malware, you’ll get an idea of ​​what it does.

Google has reported that Peaklight attacks on people's systems have increased dramatically. And unfortunately for copyright violators, it specifically targets people who want to download movies illegally.

How does the Peaklight attack work?

What to Know About Peaklight: New Stealth Malware Targets Illegal Movie Downloads
Peaklight Process

The Peaklight downloader gets into people’s systems using a sneaky trick. A malicious actor uploads an LNK file with a custom icon disguised as a movie file. The LNK file itself is not malicious, but the malware publishers can program it to perform malicious actions. In this case, the LNK file is programmed to open PowerShell and use it to download Peaklight.

Once the malicious agent sets up the trap, it's time for them to wait for someone to trigger it.

Victims of pirated movie downloads

The attack starts when someone searches online for a movie to illegally download. They visit a website that performs an automatic download, and then the Peaklight attack is injected into their system as a ZIP file.

Inside the ZIP file is an LNK file disguised as a movie file. The victim may believe they have downloaded the movie they are looking for and double-click the file to open the "movie". This will trigger the script in the LINK file.

Victim activates downloaded LNK file

Now that the LNK file is active, it will open PowerShell and issue a command to download Peaklight. It uses special tactics to confuse anti-virus applications to hide its purpose.

Peaklight runs entirely in the computer's memory to hide its tracks, rather than running in the target's memory. This is a particularly effective trick the malware uses to make itself harder to detect, as the system's antivirus software must actively scan the RAM to detect Peaklight's presence.

Peaklight downloads its payloads to the target PC

When Peaklight runs on a target PC, it does a quick check to see if the payloads are installed. If not, it starts downloading and running malicious services. Google found it downloading LUMMAC.V2, SHADOWADDER, and CRYPTBOT, all of which are focused on stealing information like cryptocurrency wallets.

How to avoid getting infected with Peaklight

Unfortunately, pirating movies and software online is dangerous, not to mention illegal. There are many malicious actors on the Internet who aim to exploit people searching for popular movies online and trick them into downloading malicious files. So, if you’re not pirating, you’ll want to stay away from Peaklight.

Even if you don't download illegal files, this is a good lesson in how to handle automatic downloads. If you visit a website and find that it automatically downloads something to your computer without your permission, proceed with extreme caution.

Sometimes automatic downloads are perfectly safe. For example, if you find a PDF file in a Google search and click the link, your browser may automatically download the file to your hard drive. However, if the downloaded file contains something you can execute or run, it's best to delete it.

The Peaklight malware is particularly dangerous because it targets people looking for an easy way to get a free movie. If you're worried about your system being infected with malware, always enjoy media through legal means and make sure anyone else who uses your PC does the same.

Sign up and earn $1000 a day ⋙

Leave a Comment

How to Add Recycle Bin to File Explorer

How to Add Recycle Bin to File Explorer

This guide will show you all the steps needed to show the Recycle Bin in File Explorer, regardless of whether you are using Windows 10 or Windows 11.

What to Know About Peaklight: New Stealth Malware Targets Illegal Movie Downloads

What to Know About Peaklight: New Stealth Malware Targets Illegal Movie Downloads

Now, a new attack called Peaklight is going viral and targeting people who download movies illegally.

Bluetooth 6.0 brings new technology that helps Apple improve Find My network

Bluetooth 6.0 brings new technology that helps Apple improve Find My network

The Bluetooth Special Interest Group (Bluetooth SIG) released the specifications for the next generation of the technology, called Bluetooth 6.0, this week.

How to use abstract images to create phone wallpapers

How to use abstract images to create phone wallpapers

You can create your own phone wallpapers from abstract photos. Not only are they beautiful, but the process of creating them is quite fun.

Why is choosing the right charger more difficult than it needs to be?

Why is choosing the right charger more difficult than it needs to be?

Choosing the wrong charger can cause your device to charge slowly or even break. And with so many options and similar products, finding the right one is harder than ever.

Users May Soon See Instagram Comments on Threads

Users May Soon See Instagram Comments on Threads

Instagram could roll out a way to share comments on other Instagram posts to Threads, according to Alessandro Paluzzi, who regularly analyzes Meta's social media apps to spot upcoming features.

List of features users want in Apple Intelligence

List of features users want in Apple Intelligence

The release of Apple Intelligence has many people excited, but there is still room for improvement. Apple could add some features to make it even better.

Facebook message statistics to see who messages the most on Facebook

Facebook message statistics to see who messages the most on Facebook

Facebook Messenger is currently the most used messaging application, so do you know who messages you the most? The following article will guide readers to see who messages the most on Messenger.

Why is Lens Blur a Photoshop tool used for artistic photo editing?

Why is Lens Blur a Photoshop tool used for artistic photo editing?

Adobe's Lens Blur tool makes it easy to review your photos, adding depth and focus to your photos.

How to translate Apple Podcasts directly

How to translate Apple Podcasts directly

iOS 17.4 adds live translation to Apple Podcasts. You can choose which languages ​​you want to translate to for the content of the podcast you're listening to.

US company develops nuclear battery that can operate continuously for 50 years

US company develops nuclear battery that can operate continuously for 50 years

Two US companies Kronos Advanced Technologies and Yasheng Group are working together to develop nuclear batteries that can operate continuously for decades without recharging to narrow the gap with China.

Killer birds blind and kill poisonous African snakes

Killer birds blind and kill poisonous African snakes

Despite possessing extremely dangerous venom, the tree snake can only endure the enemy's "heavenly" pecks to the eyes and head.

ChatGPT Will Kill These 4 Types of Websites

ChatGPT Will Kill These 4 Types of Websites

AI chatbots are completely reshaping the way users interact with websites and making some types of websites obsolete in the process.

The 6 Biggest Problems With Using One-Click AI Photo Enhancement Tools

The 6 Biggest Problems With Using One-Click AI Photo Enhancement Tools

AI photo enhancement tools promise to improve your photos with just one click. However, while these tools are convenient, there are still some problems with using them.

Jax DTCL season 8: Build, Fighter Jax team

Jax DTCL season 8: Build, Fighter Jax team

Jax DTCL season 8 is a carry even though he is a Fighter, his skills increase damage over time and that is the main reason he turns into a carry easily.