• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
rhadamanthys malware: swiss army knife of information stealers emerges

Rhadamanthys Malware: Swiss Army Knife of Information Stealers Emerges

You are here: Home / General Cyber Security News / Rhadamanthys Malware: Swiss Army Knife of Information Stealers Emerges
December 18, 2023

The developers of the details stealer malware recognized as Rhadamanthys are actively iterating on its attributes, broadening its data-gathering capabilities and also incorporating a plugin process to make it far more customizable.

This technique not only transforms it into a menace capable of offering “specific distributor needs,” but also will make it additional powerful, Check out Place stated in a specialized deepdive released previous 7 days.

Rhadamanthys, to start with documented by ThreatMon in Oct 2022, has been bought below the malware-as-a-provider (MaaS) model as early as September 2022 by an actor beneath the alias “kingcrete2022.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Commonly distributed as a result of malicious websites mirroring those people of legitimate software package that are marketed by Google advertisements, the malware is able of harvesting a extensive selection of delicate data from compromised hosts, including from web browsers, crypto wallets, email customers, VPN, and instant messaging apps.

Future WEBINAR Beat AI-Run Threats with Zero Have faith in – Webinar for Security Gurus

Standard security actions won’t minimize it in modern globe. It is time for Zero Have faith in Security. Secure your knowledge like never in advance of.

Be a part of Now

“Rhadamanthys signifies a move in the rising custom of malware that tries to do as much as achievable, and also a demonstration that in the malware business enterprise, acquiring a powerful model is almost everything,” the Israeli cybersecurity business mentioned in March 2022.

A subsequent investigation into the off-the-shelf malware in August discovered “design and style and implementation” overlap with that of the Hidden Bee coin miner.

“The similarity is obvious at a lot of ranges: tailor made executable formats, the use of similar virtual filesystems, equivalent paths to some of the components, reused capabilities, similar use of steganography, use of LUA scripts, and all round analogous structure,” the scientists explained, describing the malware’s advancement as “quickly-paced and ongoing.”

As of composing, the present-day functioning edition of Rhadamanthys is .5.2, for every the description on the risk actor’s Telegram channel.

Test Point’s examination of variations .5. and .5.1 reveals a new plugin process that proficiently tends to make it far more of a Swiss Army knife, indicating a shift to modularization and customization. This also enables the stealer consumers to deploy more applications tailor-made to their targets.

The stealer elements are each active, capable of opening processes and injecting extra payloads built to aid info theft, and passive, which are made to lookup and parse certain files to retrieve saved credentials.

One more obvious part is the use of a Lua script runner that can load up to 100 Lua scripts to pilfer as substantially details as doable from cryptocurrency wallets, email brokers, FTP providers, observe-using apps, prompt messengers, VPNs, two-factor authentication apps, and password managers.

Edition .5.1 goes a move further, introducing clipper functionality to alter clipboard info matching wallet addresses to divert cryptocurrency payments to an attacker-managed wallet as properly as an possibility to recover Google Account cookies, following the footsteps of Lumma Stealer.

“The author retains enriching the set of out there features, hoping to make it not only a stealer but a multipurpose bot, by enabling it to load numerous extensions designed by a distributor,” security researcher Aleksandra “Hasherezade” Doniec stated.

Cybersecurity

“The included capabilities, these types of as a keylogger, and amassing information and facts about the technique, are also a step to making it a general-intent spy ware.”

AsyncRAT’s Code Injection into aspnet_compiler.exe

The results arrive as Craze Micro detailed new AsyncRAT infection chains that leverage a legitimate Microsoft procedure referred to as aspnet_compiler.exe, which is made use of for precompiling ASP.NET web programs, to stealthily deploy the remote accessibility trojan (RAT) by using phishing attacks.

Related to how Rhadamanthys carries out code injection into operating processes, the multi-stage approach culminates in the AsyncRAT payload remaining injected into a newly spawned aspnet_compiler.exe course of action to in the long run build get in touch with with a command-and-regulate (C2) server.

“The AsyncRAT backdoor has other abilities based on the embedded configuration,” security researchers Buddy Tancio, Fe Cureg, and Maria Emreen Viray claimed. “This incorporates anti-debugging and analysis checks, persistence set up, and keylogging.”

It’s also intended to scan certain folders inside of the application directory, browser extensions, and consumer details to check out for the presence of crypto wallets. On best of that, the menace actors have been observed relying on Dynamic DNS (DDNS) to intentionally obfuscate their things to do.

“The use of dynamic host servers permits risk actors to seamlessly update their IP addresses, strengthening their capability to continue being undetected inside the program,” the researchers claimed.

Identified this write-up exciting? Stick to us on Twitter  and LinkedIn to read through a lot more distinctive content material we put up.


Some areas of this article are sourced from:
thehackernews.com

Previous Post: «four u.s. nationals charged in $80 million pig butchering crypto Four U.S. Nationals Charged in $80 Million Pig Butchering Crypto Scam
Next Post: Top 7 Trends Shaping SaaS Security in 2024 top 7 trends shaping saas security in 2024»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.