• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new rugmi malware loader surges with hundreds of daily detections

New Rugmi Malware Loader Surges with Hundreds of Daily Detections

You are here: Home / General Cyber Security News / New Rugmi Malware Loader Surges with Hundreds of Daily Detections
December 28, 2023

A new malware loader is remaining employed by threat actors to supply a extensive assortment of information stealers this sort of as Lumma Stealer (aka LummaC2), Vidar, RecordBreaker (aka Raccoon Stealer V2), and Rescoms.

Cybersecurity company ESET is monitoring the trojan beneath the title Win/TrojanDownloader.Rugmi.

“This malware is a loader with 3 varieties of components: a downloader that downloads an encrypted payload, a loader that runs the payload from inside sources, and an additional loader that operates the payload from an external file on the disk,” the organization stated in its Risk Report H2 2023.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Telemetry facts collected by the company displays that detections for the Rugmi loader spiked in October and November 2023, surging from one digit day by day quantities to hundreds for every working day.

Forthcoming WEBINAR From Person to ADMIN: Understand How Hackers Acquire Entire Regulate

Find the magic formula practices hackers use to turn into admins, how to detect and block it in advance of it can be too late. Register for our webinar nowadays.

Be part of Now

Stealer malware is normally offered underneath a malware-as-a-service (MaaS) product to other danger actors on a subscription foundation. Lumma Stealer, for instance, is advertised in underground discussion boards for $250 a month. The most high-priced plan fees $20,000, but it also gives the prospects access to the source code and the suitable to sell it.

There is proof to counsel that the codebase connected with Mars, Arkei, and Vidar stealers has been repurposed to build Lumma.

Aside from repeatedly adapting its practices to evade detection, the off-the-shelf resource is dispersed through a assortment of solutions ranging from malvertising to fake browser updates to cracked installations of well known software these as VLC media player and OpenAI ChatGPT.

Yet another method concerns the use of Discord’s material shipping network (CDN) to host and propagate the malware, as revealed by Development Micro in October 2023.

This involves leveraging a mix of random and compromised Discord accounts to send out direct messages to prospective targets, providing them $10 or a Discord Nitro membership in trade for their help on a undertaking.

Buyers who concur to the supply are then urged to obtain an executable file hosted on Discord CDN that masquerades as iMagic Stock but, in actuality, contains the Lumma Stealer payload.

“Completely ready-produced malware methods lead to the proliferation of destructive campaigns due to the fact they make the malware out there even to probably significantly less technically skilled threat actors,” ESET said.

Cybersecurity

“Offering a broader variety of capabilities then serves to render Lumma Stealer even far more desirable as a merchandise.”

The disclosures appear as McAfee Labs disclosed a new variant of NetSupport RAT, which emerged from its respectable progenitor NetSupport Manager and has due to the fact been put to use by initial accessibility brokers to assemble facts and carry out more steps on victims of fascination.

“The an infection commences with obfuscated JavaScript data files, serving as the first position of entry for the malware,” McAfee reported, incorporating it highlights the “evolving techniques employed by cybercriminals.”

The execution of the JavaScript file advances the attack chain by running PowerShell instructions to retrieve the distant management and stealer malware from an actor-controlled server. The campaign’s principal targets involve the U.S. and Canada.

Uncovered this write-up attention-grabbing? Abide by us on Twitter  and LinkedIn to read extra unique content we write-up.


Some parts of this report are sourced from:
thehackernews.com

Previous Post: «critical zero day in apache ofbiz erp system exposes businesses to Critical Zero-Day in Apache OfBiz ERP System Exposes Businesses to Attack
Next Post: Most Sophisticated iPhone Hack Ever Exploited Apple’s Hidden Hardware Feature most sophisticated iphone hack ever exploited apple's hidden hardware feature»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.