EmEditor Website Compromised to Deliver Infostealer
Popular text editor's download page was hijacked for four days in December, serving trojanized installers that steal browser credentials and crypto wallets.
The official website of EmEditor, a text and code editor popular among developers and system administrators, was compromised between December 19 and 22, 2025. During this four-day window, visitors who clicked the "Download Now" button received a trojanized installer containing a fully-featured information-stealing trojan.
What Happened
Attackers compromised the redirect mechanism on EmEditor's website—not the software itself. When users clicked the download button, they were silently redirected to a malicious installer hosted within EmEditor's own WordPress content directory. The attack went undetected for nearly four days before the company identified and remediated the compromise.
The malicious installer was signed by "WALSHAM INVESTMENTS LIMITED," a certificate that has no connection to Emurasoft, the Japanese company behind EmEditor. This certificate has since been revoked, but during the attack window it allowed the malware to pass initial Windows SmartScreen checks without triggering warnings.
Emurasoft disclosed the incident on December 22 and confirmed that users who:
- Downloaded via the built-in Update Checker were not affected
- Downloaded directly from download.emeditor.info were not affected
- Used portable or Microsoft Store versions were not affected
Only users who clicked the main website's download button during the attack window are at risk.
The Malware Payload
The trojanized installer deploys a multi-stage credential theft operation. Initial analysis from security researchers at Qianxin revealed:
Browser credential harvesting - The malware targets Chrome, Edge, Brave, and Opera, extracting saved passwords, cookies, browsing history, and autofill data.
Application credential theft - Beyond browsers, the payload harvests credentials from Discord, Slack, Zoom, Microsoft Teams, WinSCP, and PuTTY. Developers and IT administrators—EmEditor's core user base—likely have credentials for these applications stored locally.
Persistent browser extension - The most concerning component installs a browser extension masquerading as "Google Drive Caching." This extension persists even if the initial malware payload is detected and removed.
The extension communicates with cachingdrive.com and incorporates domain generation algorithm (DGA) logic to maintain operations even if primary command-and-control infrastructure is disrupted. It captures:
- Complete browser history and bookmarks
- Session cookies (enabling session hijacking)
- Clipboard contents
- Installed extension data
The clipboard monitoring specifically targets cryptocurrency wallet addresses. Researchers identified support for over 30 different cryptocurrency address formats, automatically replacing copied addresses with attacker-controlled wallets.
Geographic Exclusions
The malware includes a "do not infect" list based on system language settings. It self-terminates if it detects locales for Russia, Ukraine, Kazakhstan, Belarus, Azerbaijan, Armenia, Georgia, or Iran. This targeting pattern is consistent with threat actors operating from the former Soviet sphere, following an unwritten rule among Eastern European cybercriminals to avoid targeting domestic systems.
Connection to Broader Infostealer Ecosystem
This attack fits a disturbing pattern we've tracked throughout 2025. The LotusBail NPM supply chain attack and GlassWorm macOS campaign showed similar tactics—compromising trusted distribution channels to deliver credential stealers.
Recent research from KELA shows infostealers compromised 3.9 billion credentials from infected devices in 2025, with Lumma, StealC, and RedLine responsible for over 75% of infections. The EmEditor attack demonstrates that supply chain compromise remains an effective delivery mechanism, bypassing the phishing detection that blocks most infostealer distribution attempts.
For guidance on protecting against credential theft, see our phishing examples guide which covers social engineering tactics commonly used alongside these attacks.
What To Do If You Downloaded During the Attack Window
If you downloaded EmEditor between December 19 and December 22, 2025:
- Isolate the system - Disconnect from the network immediately
- Check for the malicious extension - Look for "Google Drive Caching" in browser extensions
- Run comprehensive malware scans - Standard antivirus may not detect all components
- Assume credential compromise - Reset passwords for all accounts accessed from the system
- Enable MFA everywhere - Particularly on email, banking, and cryptocurrency accounts
- Monitor financial accounts - Watch for unauthorized transactions, especially crypto transfers
Organizations should check download logs and endpoint telemetry to identify any systems that may have retrieved the malicious installer during the attack window.
Supply Chain Security Remains the Weak Link
EmEditor's compromise illustrates a fundamental challenge: users trust official download pages. When that trust is exploited, traditional security controls fail. The installer was signed (though by an unfamiliar entity), hosted on legitimate infrastructure, and distributed through expected channels.
Developer tools represent high-value targets for supply chain attacks. Their users typically have elevated privileges, access to source code repositories, and credentials for production systems. A compromised text editor on a developer workstation opens doors that phishing campaigns struggle to reach.
Emurasoft has implemented additional security controls following the incident, though specific details haven't been disclosed. For users, the incident is a reminder to verify installer signatures against known good values—and to question unfamiliar certificate authorities even when the download source appears legitimate.
Related Articles
Stolen Credentials Fuel Self-Sustaining Malware Distribution
Hudson Rock research reveals 220 legitimate business websites hijacked for ClickFix malware attacks after admin credentials were stolen by infostealers.
Jan 5, 2026GlassWorm Malware Pivots to macOS, Targets Crypto Wallets
The self-propagating VS Code extension worm now replaces Ledger Live and Trezor Suite with trojanized versions. Russian-speaking operators behind campaign.
Jan 2, 2026SantaStealer Malware-as-a-Service Launches Just in Time for the Holidays
Russian-developed infostealer now production-ready after December 16 release, targets browser credentials, crypto wallets, and messaging apps for $175/month.
Dec 19, 2025Fog Ransomware Targets US Schools Through Stolen VPNs
A ransomware operation has compromised multiple US educational institutions using stolen VPN credentials. The education sector represents 80% of known victims.
Jan 10, 2026