Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Facebook X (Twitter) Instagram
Sunday, February 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Phishing Campaign Uses UpCrypter to Deploy Remote Access Tools
Cyber Security

Phishing Campaign Uses UpCrypter to Deploy Remote Access Tools

Team-CWDBy Team-CWDSeptember 11, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A global phishing campaign using personalized emails and fake websites to deliver malicious downloads has been identified by cybersecurity researchers.

According to a new advisory by FortiGuard Labs, the operation employs a custom loader called UpCrypter to install a range of remote access tools (RATs), giving attackers prolonged control of compromised systems.

How the Attack Works

The campaign begins with phishing emails carrying HTML attachments that redirect victims to spoofed websites. These sites are tailored to each recipient by embedding their email address and even fetching their company logo, increasing the illusion of legitimacy.

Variants of the campaign use themes such as:

  • A voicemail-themed email claiming the recipient missed a call, with an HTML attachment that silently redirects the browser to a phishing site

  • A purchase order spoof written in Chinese, carrying an HTML attachment that builds a malicious URL and steers the victim to a counterfeit page

Once redirected, users are urged to download a ZIP archive containing an obfuscated JavaScript file. This script executes PowerShell commands, evades detection tools and retrieves the next payload from attacker-controlled servers.

In some cases, data is hidden inside image files using steganography to avoid security scans.

Read more on phishing campaigns: 752,000 Browser Phishing Attacks Mark 140% Increase YoY

UpCrypter as a Delivery Hub

UpCrypter, a loader maintained by its developer and showcased on YouTube, plays a central role in the observed campaign. It checks for forensic tools, virtual machines and sandboxes before running.

If analysis is suspected, the malware forces a system restart to disrupt investigations. Once validated, it downloads additional components, executes them in memory and establishes persistence by altering registry keys.

The final payloads observed include PureHVNC, DCRat and Babylon RAT. These tools allow attackers to perform actions such as keylogging, file theft and full remote control of a target’s machine.

Growing Global Reach

FortiGuard Labs noted that the campaign is expanding quickly, with detections doubling in just two weeks. The industries most affected include manufacturing, technology, healthcare, construction and retail/hospitality.

Researchers emphasized that this is not a straightforward phishing scheme to steal email credentials, but rather a comprehensive attack chain that installs sophisticated malware within corporate environments.

“Users and organizations should take this threat seriously, use strong email filters and make sure staff are trained to recognize and avoid these types of attacks,” Fortinet concluded.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleRansomware Actor Deletes Data and Backups Post-Exfiltration on Azure
Next Article Attacker “Patches” Vulnerability Post Exploitation to Lock Out Competi
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

When ‘hacking’ your game becomes a security risk

October 17, 2025

Here’s what you should know

February 6, 2026

Chronology of a Skype attack

February 5, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.