Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Phishing Campaign Evolves into PureRAT Deployment
News

Phishing Campaign Evolves into PureRAT Deployment

Team-CWDBy Team-CWDSeptember 25, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A recent investigation has revealed a phishing campaign that began with a simple Python-based infostealer but ultimately led to the deployment of PureRAT, a full-featured commodity remote access trojan (RAT).

The research, published by Huntress, highlights how the attackers evolved from using custom scripts to leveraging a sophisticated, commercially available tool.

Chain of Attack

The operation started with phishing emails containing a ZIP archive disguised as a copyright notice. Inside was a signed PDF reader executable and a malicious version.dll, enabling the attackers to use DLL sideloading. This launched a chain of 10 stages, gradually escalating in complexity with layers of loaders, encryption and persistence mechanisms.

What set this campaign apart was the transition in stage 3 from Python scripts to compiled .NET executables.

The attackers used process hollowing against RegAsm.exe, patched Windows defenses such as AMSI and ETW and unpacked further payloads until the final DLL was revealed as PureRAT. This trojan provides attackers with encrypted command-and-control channels, host fingerprinting and the ability to load additional malicious modules.

Tracing the Operation

Earlier stages focused on credential theft and data harvesting from browsers like Chrome and Firefox. 

Stolen information was packaged into ZIP files and sent through the Telegram Bot API. Metadata linked to the handle @LoneNone connected the campaign to the PXA Stealer family, previously associated with Vietnamese threat actors.

The command-and-control server for PureRAT was also traced to Vietnam, reinforcing this attribution.

Read more on PureRAT: Accounting Firm Targeted by Malware Campaign Using New Crypter

Defensive Lessons

The campaign demonstrates the use of multiple evasion techniques, including sideloaded DLLs, certutil-based decoding, obfuscated Python loaders and reflective loading of .NET assemblies. 

Huntress noted that detecting such activity requires monitoring behaviors rather than relying on a single defensive measure. Indicators include:

  • Suspicious use of certutil.exe for decoding files

  • Legitimate executables running from unusual directories such as C:UsersPublicWindows

  • Process hollowing of RegAsm.exe

  • Outbound TLS connections pinned with attacker-controlled certificates

“This campaign underscores the importance of defense-in-depth. The initial access relied on user execution, the loaders exploited trusted and system binaries, and the final stage used defense evasion to remain hidden,” the company wrote.

“No single control could have stopped this entire chain. By understanding the full lifecycle of the attack and monitoring for the specific behaviors outlined here, from certutil abuse to WMI queries and encrypted C2 traffic, organizations can build a more resilient security posture.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleRaccoonO365 Phishing Network Dismantled as Microsoft, Cloudflare Take Down 338 Domains
Next Article Rethinking AI Data Security: A Buyer’s Guide 
Team-CWD
  • Website

Related Posts

News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Why you should never pay to get paid

September 15, 2025

Look out for phony verification pages spreading malware

September 14, 2025

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.