Original Article Text

Click to Toggle View

Fake ‘One Battle After Another’ torrent hides malware in subtitles. A fake torrent for Leonardo DiCaprio’s 'One Battle After Another' hides malicious PowerShell malware loaders inside subtitle files that ultimately infect devices with the Agent Tesla RAT malware. The malicious torrent file was discovered by Bitdefender researchers while investigating a spike in detections related to the movie. One Battle After Another is a highly rated Paul Thomas Anderson movie released on September 26, 2025, starring Leonardo DiCaprio, Sean Penn, and Benicio del Toro. Cybercriminals taking advantage of interest around new movies by uploading malicious torrents isn't anything new, but Bitdefender notes this case stands out for its unusually complex and stealthy infection chain. "It's impossible to estimate how many people downloaded the files, but we saw that the supposed movie had thousands of seeders and leechers," explained Bitdefender. Launching malware from subtitles The downloaded One Battle After Another movie torrent used in the attacks contains various files, including a movie file (One Battle After Another.m2ts), two image files (Photo.jpg, Cover.jpg), a subtitles file (Part2.subtitles.srt), and a shortcut file (CD.lnk) that appears as a movie launcher. When the CD shortcut is executed, it launches Windows commands that extract and run a malicious PowerShell script embedded in the subtitle file between lines 100 and 103. This PowerShell script will then extract numerous AES-encrypted data blocks from the subtitles file again to reconstruct five PowerShell scripts that are dropped to 'C:\Users\<USER>\AppData\Local\Microsoft\Diagnostics.' The extracted PowerShell scripts act as a malware dropper, performing the following actions on the host: The files extracted in the final stage are used to check whether Windows Defender is active, install Go, extract the final payload (AgentTesla), and load it directly into memory. AgentTesla is a long-running (since 2014) Windows RAT and information stealer, commonly used to steal browser, email, FTP, and VPN credentials, as well as to capture screenshots. While Agent Tesla is not new, it remains widely used due to its reliability and ease of deployment. Bitdefender has noted that in other movie titles, for example, 'Mission: Impossible – The Final Reckoning,' it has observed other families used, such as Lumma Stealer. Torrent files from anonymous publishers often contain malware, so it is recommended that users avoid pirating new movies entirely for safety. Break down IAM silos like Bitpanda, KnowBe4, and PathAI Broken IAM isn't just an IT problem - the impact ripples across your whole business. This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.

Daily Brief Summary

MALWARE // Fake Movie Torrent Distributes Agent Tesla via Subtitle Files

Bitdefender researchers identified a fake torrent for "One Battle After Another" containing malware hidden in subtitle files, exploiting interest in the newly released film.

The torrent file includes a malicious PowerShell script embedded within subtitle files, which activates upon executing a shortcut file disguised as a movie launcher.

Once activated, the script reconstructs additional PowerShell scripts that check for Windows Defender, install Go, and deploy the Agent Tesla RAT payload.

Agent Tesla, active since 2014, is a Windows-based Remote Access Trojan used to steal credentials and capture screenshots, known for its reliability and ease of use.

The infection chain is noted for its complexity and stealth, making it difficult for users to detect the malicious activity until it's too late.

Bitdefender advises against downloading torrents from unknown sources due to the high risk of malware, as seen in similar cases with other popular movie titles.

This incident serves as a reminder of the persistent threat posed by cybercriminals exploiting popular media content to distribute malware.