Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Bitcoin Depot Reports $3.6m Crypto Theft After System Breach

April 9, 2026

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)

April 9, 2026

STX RAT Targets Finance Sector With Advanced Stealth Tactics

April 9, 2026
Facebook X (Twitter) Instagram
Friday, April 10
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»STX RAT Targets Finance Sector With Advanced Stealth Tactics
News

STX RAT Targets Finance Sector With Advanced Stealth Tactics

Team-CWDBy Team-CWDApril 9, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A previously undocumented remote access trojan (RAT) known as STX RAT has been identified following an attempted deployment in a financial services environment in late February 2026.

The malware, tracked by eSentire’s Threat Response Unit, uses a distinctive communication marker tied to its command-and-control (C2) traffic and demonstrates a high level of technical sophistication.

The researchers said the malware relies on opportunistic delivery methods, including browser-downloaded scripts and trojanized installers, to gain initial access.

Sophisticated Delivery and Execution Chain

STX RAT is delivered through multi-stage scripts that escalate privileges and execute payloads directly in memory, avoiding traditional file-based detection. In one observed case, a VBScript file generated and launched a JScript component, which then retrieved a compressed archive containing the main payload and a PowerShell loader.

Key characteristics include:

  • Multi-stage unpacking using XXTEA encryption and Zlib compression

  • In-memory execution via PowerShell and reflective loading techniques

  • Multiple persistence mechanisms, including registry-based autorun and COM hijacking

A defining feature of STX RAT is its encrypted communication protocol. It uses modern cryptographic methods to secure data exchanges between infected systems and attacker infrastructure, making interception and analysis more difficult.

The malware also delays its credential-stealing functions until it receives explicit instructions from its command server. This reduces detectable behavior during automated analysis.

Defensive evasion is extensive. STX RAT scans for virtual environments, terminates execution if analysis is suspected and obscures internal strings using layered encryption techniques.

Broad Surveillance and Control Capabilities

Once active, the malware enables attackers to remotely control infected machines through a hidden virtual desktop. This functionality allows actions to be carried out without the user’s awareness.

Its capabilities extend to harvesting sensitive information from browsers, FTP clients and cryptocurrency wallets. It can also execute additional payloads, create network tunnels and simulate user input.

Read more on remote access trojans: Hackers Hijack Axios npm Package to Spread RATs

The command structure supports a wide range of post-exploitation actions, from credential extraction to full system interaction. eSentire noted that its design suggests ongoing development, with some features not yet fully operational.

The researchers said the team isolated the affected system to contain the threat and are continuing to monitor related activity. The firm also urged organizations to strengthen endpoint protections and limit exposure to script-based attacks commonly used in initial compromise.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleGoogle Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069
Next Article 3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)
Team-CWD
  • Website

Related Posts

News

Bitcoin Depot Reports $3.6m Crypto Theft After System Breach

April 9, 2026
News

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)

April 9, 2026
News

Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

April 9, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views
Our Picks

How chatbots can help spread scams

October 14, 2025

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

Is Poshmark safe? How to buy and sell without getting scammed

February 19, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.