Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
Redhotcyber Banner Sito 970x120px Uscita 101125
RenderShock: The new digital threat that attacks Windows systems with a mouse click

RenderShock: The new digital threat that attacks Windows systems with a mouse click

15 July 2025 14:43

A new form of digital attack called RenderShock has hit corporate Windows systems. It doesn’t require any clicks or opening attachments: everything happens completely in the background, via trusted preview and indexing mechanisms built into the operating system itself. Unlike classic malware, RenderShock uses so-called passive execution surfaces, which are services that run automatically and process files without user intervention. These vulnerable connections include Explorer preview panes, virus scanners, indexing services, and cloud synchronization tools.

The main idea of the attack is to use trusted system processes to process obviously malicious files. It’s enough for such a file to end up in a folder available for previewing or indexing for the infection mechanism to be immediately activated. This can happen if the file ends up in corporate email, on a shared drive, in a cloud folder, or via a flash drive. Even simply hovering the cursor over the file can trigger an attempt to connect to a remote server.

RenderShock works according to a clearly structured five-stage scheme. First, a malicious file is created, which could be a document, an image, or a link. Attackers then place these files in locations where systems are guaranteed to detect them. Automatic activation then occurs when the file interacts with one of the passive system components. Information gathering then begins, such as sending DNS queries or capturing NTLM hashes to steal credentials. The final stage is remote code execution or further penetration of the infrastructure.

The particular danger of RenderShock is that the attack masquerades as standard system process activity. The explorer.exe, searchindexer.exe, or Microsoft Office Document Preview processes perform “normal actions” and remain undetected by most security systems. Most corporate antivirus programs don’t monitor the network activity of such processes, which means they can’t react in time.

An example shows how an infected LNK file inside a ZIP archive can force Windows Explorer to download an icon via SMB from a remote server. The system automatically transmits authentication data, even if the user hasn’t opened anything. These actions occur instantly and stealthily.

The new RenderShock scheme clearly demonstrates how even routine, seemingly secure operations are becoming vulnerable in today’s enterprise environments. Organizations that rely on built-in previews and automatic indexing should reconsider their security practices.

Experts recommend disabling file previews, limiting outbound SMB traffic, strengthening Office security settings, and monitoring atypical preview-related process activity. RenderShock challenges the fundamental principles of trust in your systems and requires a completely new approach to digital hygiene in enterprises.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.