Cybersecurity researchers at Cisco Talos have identified a previously undocumented botnet, dubbed PowMix, engaged in an ongoing campaign against the workforce in the Czech Republic. Active since at least December 2025, the PowMix botnet is delivered via phishing campaigns and is designed for reconnaissance, remote access, and code execution. The malware's operators have put a significant emphasis on stealth, utilizing sophisticated techniques to evade detection. These include using randomized intervals for its command-and-control (C2) communications and embedding encrypted data within C2 URL paths to make the malicious traffic blend in with legitimate network activity. The campaign primarily targets individuals in HR, legal, and finance roles.
Threat Actor: The threat actor behind the PowMix campaign is currently unspecified but demonstrates a degree of sophistication in both social engineering and technical implementation.
Attack Chain:
T1566.001 - Spearphishing Attachment..LNK) file. When the victim opens this file, it executes a PowerShell loader command.The most notable aspect of PowMix is its C2 communication protocol, which is designed for stealth:
https://c2-domain.com/api/v1/data={encrypted_blob}), allowing it to blend in with normal web traffic and bypass simple URL filters.These C2 characteristics align with MITRE ATT&CK techniques like T1571 - Non-Standard Port (conceptually, by mimicking other traffic) and T1071.001 - Web Protocols.
A successful PowMix infection provides the attacker with a persistent foothold inside a target organization. From this foothold, the attacker can conduct reconnaissance, steal sensitive data, move laterally to other systems, and deploy additional payloads like ransomware or credential stealers. Given the targeting of HR, legal, and finance professionals, the attackers are likely motivated by financial gain or corporate espionage, seeking access to sensitive employee data, financial information, or intellectual property.
| Type | Value | Description |
|---|---|---|
| Command Line Pattern | powershell.exe -ExecutionPolicy Bypass -File *.ps1 |
A common pattern for executing malicious PowerShell scripts, often launched by LNK files. |
| Event ID | 4104 (PowerShell Script Block Logging) |
Provides the full content of executed PowerShell scripts, which can reveal the in-memory loader. |
| Network Traffic Pattern | Outbound HTTP/S requests with unusually long or randomized-looking URL paths containing large data blobs | Key indicator of PowMix's C2 communication. |
| Process Name | schtasks.exe |
Monitor for the creation of new scheduled tasks by unusual processes, which PowMix uses for persistence. |
Detection:
explorer.exe spawning cmd.exe which in turn spawns powershell.exe.Response:
Constrained Language Mode. This is a form of D3-ACH: Application Configuration Hardening.Enable and collect detailed PowerShell logs (e.g., Script Block Logging) to detect fileless malware execution.
Use network traffic analysis and egress filtering to identify and block the anomalous C2 communication patterns used by PowMix.
Mapped D3FEND Techniques:
Train users to be skeptical of unsolicited emails with attachments, especially those creating a false sense of urgency related to compliance or legal matters.
To detect the stealthy PowMix botnet, organizations in the Czech Republic and beyond should leverage Network Traffic Analysis (NTA) focused on identifying its specific evasion techniques. Since PowMix uses randomized beaconing intervals, time-based analysis is ineffective. Instead, security teams must focus on the structure of the C2 traffic itself. Deploy deep packet inspection (DPI) or a web proxy that logs full URLs. Create detection rules that hunt for outbound GET requests to unknown or newly-seen domains where the URL path contains a long, high-entropy string, consistent with embedded encrypted data. For example, a rule could flag URLs matching a pattern like /[a-z0-9]{3,8}/[a-z0-9]{3,8}={long_base64_string}. Correlating this with threat intelligence feeds on newly registered domains can increase confidence. This content-based analysis of network traffic is the most reliable way to unmask PowMix's attempt to disguise its C2 channel as legitimate REST API calls.
The PowMix attack chain relies on the victim executing a malicious LNK file which then launches PowerShell. A strong implementation of Executable Allowlisting, such as Windows Defender Application Control (WDAC), can disrupt this chain at multiple points. First, a properly configured policy can prevent the execution of unsigned PowerShell scripts, which would block the PowMix loader. Second, by enforcing script-signing, only trusted administrators could create and run new PowerShell scripts. For environments where blocking PowerShell is not feasible, WDAC can be used to run PowerShell in Constrained Language Mode for standard users. This mode severely restricts access to the sensitive .NET functions and COM objects that fileless malware like PowMix needs to decrypt and inject its payload into memory. This effectively neuters the PowerShell loader, preventing the final botnet payload from ever running, even if the user clicks the initial LNK file.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats