Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Low-Skilled Cybercriminals Use AI to Perform “Vibe Extortion” Attacks

February 17, 2026

China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

February 17, 2026

Significant Rise in Ransomware Attacks Targeting Industrial Operations

February 17, 2026
Facebook X (Twitter) Instagram
Tuesday, February 17
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»OysterLoader Evolves With New C2 Infrastructure and Obfuscation
News

OysterLoader Evolves With New C2 Infrastructure and Obfuscation

Team-CWDBy Team-CWDFebruary 17, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A multi-stage malware loader known as OysterLoader has continued to evolve into early 2026, refining its command-and-control (C2) infrastructure and obfuscation methods.

The C++-based threat, also referred to as Broomstick and CleanUp, is primarily linked to campaigns associated with the Rhysida ransomware group and has also been used to distribute commodity malware such as Vidar.

First reported in June 2024, the loader is typically delivered through fraudulent websites impersonating legitimate IT tools including PuTTY and WinSCP. It arrives disguised as a signed Microsoft Installer file and unfolds across four distinct stages, each designed to hinder analysis and detection.

Multi-Stage Infection Chain

According to a new advisory by Sekoia Security, OysterLoader’s latest infection process is structured as follows:

  • Stage 1: A packer known as TextShell that loads obfuscated shellcode into memory

  • Stage 2: Custom shellcode that decompresses the core payload using a modified LZMA routine

  • Stage 3: An intermediate downloader that performs environment checks and initiates C2 contact

  • Stage 4: The core payload, often deployed as a DLL for persistent execution

Read more on malware C2 infrastructure: Global SystemBC Botnet Found Active Across 10,000 Infected Systems

In the second stage, the malware uses a bespoke LZMA decompression routine. Although the compression parameters remain standard, the header format and bitstream are modified, preventing common tools from recognizing or extracting the payload. Once decompressed, the shellcode adjusts memory protections and resolves imports dynamically.

Dynamic API resolution is handled through custom hashing algorithms that vary slightly between samples. This variability complicates static detection and signature-based analysis.

Updated C2 Protocol and Infrastructure

OysterLoader communicates with its C2 servers over HTTP and HTTPS using spoofed headers and deceptive user-agent strings to blend with normal web traffic.

Earlier versions relied on two endpoints for registration and beaconing. However, the latest iteration introduces a three-step process, beginning with an empty GET request to /api/v2/init, followed by a fingerprint submission to /api/v2/facade, and concluding with beaconing to a dynamically assigned endpoint.

The malware encodes its JSON communications using a non-standard Base64 alphabet combined with a random shift value generated for each message. Recent updates allow the server to supply a new encoding alphabet during communication, further complicating traffic analysis.

Multiple endpoint revisions between May 2024 and January 2026 indicate sustained development efforts.

“The constant evolution in OysterLoader’s code, including updated C2 endpoints and JSON fingerprinting schemas, signals the high level of activity and commitment from the threat actors,” Sekoia explained.

“The quality and complexity of the malware’s development strongly suggest that OysterLoader will remain a significant and persistent threat in the near term.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More
Next Article SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers
Team-CWD
  • Website

Related Posts

News

Low-Skilled Cybercriminals Use AI to Perform “Vibe Extortion” Attacks

February 17, 2026
News

China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

February 17, 2026
News

Infostealer Targets OpenClaw to Loot Victim’s Digital Life

February 17, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

It’s all fun and games until someone gets hacked

September 26, 2025

Don’t let “back to school” become “back to bullying”

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.