BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

MixShell Malware Targets U.S. Manufacturers in ZipLine Attack

Supply Chain Manufacturers Targeted by ZipLine Campaign Using MixShell Malware and AI-Themed Social Engineering

  • Attackers are targeting supply chain-related manufacturing companies using an in-memory Malware called MixShell.
  • The campaign, identified as ZipLine, uses professional conversations through company contact forms instead of typical phishing emails.
  • Targets include industrial manufacturing, hardware, biotechnology, and other critical sectors in the U.S., Singapore, Japan, and Switzerland.
  • The attack uses multi-stage payloads and blends in with usual business operations by leveraging trusted communication channels and Artificial Intelligence (AI) themes.
  • Experts warn that the campaign can lead to theft, Ransomware, financial fraud, and major supply chain disruptions.

Cybersecurity researchers have reported a new campaign called ZipLine targeting key supply chain manufacturing companies with the MixShell malware. The campaign, mainly affecting U.S. entities as well as organizations in Singapore, Japan, and Switzerland, relies on social engineering and avoids common phishing methods by initiating contact through public “Contact Us” forms on company websites.

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading

According to Check Point Research, attackers establish multi-week conversations that appear credible and may include fake non-disclosure agreements (NDAs). After building trust, they deliver a ZIP file containing MixShell, a stealthy malware that operates in the memory of infected computers and is not stored on disk, which helps avoid detection.

The targeted companies operate in sectors such as machinery, metalwork, hardware, semiconductors, consumer goods, biotechnology, and pharmaceuticals. Check Point has found connections between digital certificates used in this campaign and infrastructure previously linked to TransferLoader attacks by the group UNK_GreenSec. The attackers use trusted business workflows to make their approach seem legitimate, and the campaign differs from standard phishing by avoiding scare tactics and urgency.

Check Point stated, “ZipLine is another instance of how threat actors are increasingly banking on legitimate business workflows, such as approaching targets via a company’s Contact Us form on their website, thereby weaponizing trust in the process to sidestep any potential concerns.”

The campaign uses advanced tactics such as multi-stage delivery of malware, in-memory execution, and covert internet communication methods like DNS tunneling. The malicious files are often hosted on sub-domains of legitimate services such as Heroku, which provides computing infrastructure for web applications. These ZIP archives contain a Windows shortcut (LNK) that starts a PowerShell loader. This loader deploys the MixShell malware, enabling remote control, file operations, persistence on the system, and deeper network infiltration.

- Advertisement -

MixShell also comes in a variant with features to evade digital forensics and maintains its presence on infected systems through scheduled tasks. Not all files from the Heroku domains are harmful—malware delivery appears to be customized.

In many cases, the attackers use domains similar to those of legitimate, registered U.S. companies, building template websites to improve the campaign’s realism. According to Check Point, risks from the campaign include theft of intellectual property, ransomware, business email compromise, financial fraud, and broader supply chain disruptions.

Sergey Shykevich of Check Point Research emphasized, “Attackers are innovating faster than ever – blending human psychology, trusted communication channels, and timely AI-themed lures. To stay safe, organizations must adopt prevention-first, AI-driven defenses and build a culture of vigilance that treats every inbound interaction as a potential threat.”

For more details, see the full Check Point Research report.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Crypto Payments Double in Australia Despite Banking Hurdles

In 2026, 12% of Australians used crypto for goods and services, a significant rise...

Meta Shuts Down Virtual Reality Horizon Worlds in June

Meta Platforms will shut down its Horizon Worlds Metaverse for VR users in June,...

Bitrefill hacked by Lazarus Group-linked cyberattack

Bitrefill, a crypto e-commerce platform, was attacked on March 1 by Hackers with methods...

NVIDIA’s DLSS 5 Sparks Backlash Over “AI Art” Changes

NVIDIA unveiled DLSS 5 at GTC 2026, marking a shift from performance upscaling to...

Poloniex’s $1.3B BTC Reserve Shortfall Exposed

Poloniex announced fee-free trading for members of its "Poloniex Super" program, but did not...

Must Read

Top 5 Best Crypto Faucets To Earn Free Crypto This Year

QUICK LINKSWhat Are Crypto Faucets and How Do They Work?How Do Crypto Faucets Make Money?What to Expect: Realistic EarningsThe Best Crypto Faucets of 2025:...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading