Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Defense Contractor Boss Pleads Guilty to Selling Zero-Day Exploits to

October 30, 2025

Meta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams

October 30, 2025

New Atroposia RAT Surfaces on Dark Web

October 30, 2025
Facebook X (Twitter) Instagram
Thursday, October 30
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»New Atroposia RAT Surfaces on Dark Web
News

New Atroposia RAT Surfaces on Dark Web

Team-CWDBy Team-CWDOctober 30, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new remote access trojan (RAT) dubbed Atroposia has been discovered by security researchers at Varonis.

The RAT uses encrypted command channels, hidden remote access, credential and wallet theft and persistence. It forms part of a growing market of criminal toolkits.

It was first identified by the cybersecurity firm on October 15 and has been observed being promoted on underground forums as a modular RAT with a full complement of offensive capabilities.

The package includes hidden remote desktop takeover (branded HRDP Connect), credential and cryptocurrency wallet theft, DNS hijacking and local vulnerability scanning.

Atroposia was seen priced at roughly $200 per month, $500 every three months or $900 for six months.

Varonis noted that the RAT could be combined with tools such as SpamGPT and MatrixPDF and used as a plug-and-play criminal toolkit.

SpamGPT is an AI-driven spam-as-a-service platform that automates phishing campaign creation, SMTP/IMAP cracking and deliverability tooling, effectively packaging marketing-grade campaign features for criminals.

MatrixPDF is a malicious PDF builder that weaponizes ordinary PDF files by adding overlays, redirects and embedded actions that help attackers bypass email filters and deliver phishing or malware lures.

Each package advanced attack capabilities into easy-to-use interfaces that automate phishing, delivery and data theft, the company noted in a recent blog where full technical details about the RAT can be found.

The Atroposia RAT uses techniques like an encrypted command and control (C2) server to foil traffic inspection. The malware also automatically escalates privileges via UAC bypass to gain admin rights and install multiple persistence mechanisms to survive reboots. 

These techniques mean Atroposia can bypass antivirus software and maintain long-term access without tipping off users or IT staff.

Daniel Kelley, a senior security researcher that works with Varonis, told Infosecurity, “Defending against Atroposia starts with reducing initial access through strong phishing defenses, regular patching, user training and multifactor authentication (MFA) enforcement. The next step is detecting post-compromise activity by monitoring authentication patterns and data flows to spot when legitimate accounts are used for lateral movement or data theft.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticlePolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign
Next Article Meta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams
Team-CWD
  • Website

Related Posts

News

Defense Contractor Boss Pleads Guilty to Selling Zero-Day Exploits to

October 30, 2025
News

Meta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams

October 30, 2025
News

PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign

October 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

Look out for phony verification pages spreading malware

September 14, 2025

Don’t let “back to school” become “back to bullying”

September 11, 2025

Why you should never pay to get paid

September 15, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.