Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Munich Security Conference: Cyber Threats Lead G7 Risk Index

February 13, 2026

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

February 13, 2026

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

February 13, 2026
Facebook X (Twitter) Instagram
Friday, February 13
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»World Leaks Ransomware Adds Custom Malware ‘RustyRocket’ to Attacks
News

World Leaks Ransomware Adds Custom Malware ‘RustyRocket’ to Attacks

Team-CWDBy Team-CWDFebruary 12, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


World Leaks, the cyber-criminal data extortion group which has targeted some of the world’s biggest companies, has added a novel, never-before-seen malware to their arsenal, research by Accenture Cybersecurity has revealed.

Accenture has named the malware ‘RustyRocket’. It allows World Leaks to stealthily maintain persistence on networks and forms a key part of the extortion groups’ attacks.

“The sophisticated toolset is a critical component of World Leaks’ operations and has functioned entirely under the radar, enabling affiliates to stealthily exfiltrate data and proxy traffic across victim environments,” T. Ryan Wheeler, MD and global head of Accenture cyber intelligence said in a LinkedIn post, which revealed the research.

World Leaks is classed as a ransomware group, but rather than encrypting data and demanding a ransom for a decryption key, they steal sensitive corporate and personal data then threaten to publish it if they are not paid a ransom.

The group has claimed Nike among their victims and exposed over 188,000 stolen files after the sports brand refused to give in to extortion demands.

RustyRocket, A Sophisticated Rust Malware

Written in Rust and designed to target both Microsoft Windows and Linux environments, RuskyRocket malware is described as a “sophisticated data exfiltration and proxy tool” which allows attackers to steal data through heavily obfuscated, multi-layered encrypted tunnels.

This blends the malicious activity within legitimate network activity. Researchers note that this makes RustyRocket activity by World Leaks “exceptionally difficult” to detect.

The malware is also designed to be difficult to monitor. To achieve this, RustyRocket employs a novel execution guardrail of requiring the user to input a pre-encrypted configuration at runtime.

“In short, this means RustyRocket is extremely hard to spot and highly flexible, making it perfectly crafted to steal data, proxy networks, and spearhead extortion‑focused cyber-attacks,” said Wheeler.

World Leaks has been active since early 2025 and typically gains initial network access via social engineering, stolen credentials or exploiting exposed infrastructure.

By deploying sophisticated, stealthy tools like RustyRocket, World Leaks can maintain persistence within the network, taking that time to gather the data which is ultimately used for blackmail extortion.

“RustyRocket is a good example of how hackers are evolving techniques to confound traditional defenses,” said Wheeler.

“It demonstrates that the best defense for enterprises is to strengthen defenses by leaning into advanced approaches for continuous threat exposure management, security testing, and red teaming, all while preparing your people to be ready for such attacks,” he added.

To help defend against World Leaks cyber-attacks which deploy RustyRocket, as well as similar malware, ransomware and extortion campaigns, Accenture recommended that organizations monitor for anomalous outbound data transfers and that network segmentation should be applied to limit lateral movement by attackers.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleOrchid Security Introduces Continuous Identity Observability for Enterprise Applications
Next Article China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns
Team-CWD
  • Website

Related Posts

News

Munich Security Conference: Cyber Threats Lead G7 Risk Index

February 13, 2026
News

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

February 13, 2026
News

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

February 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

In memoriam: David Harley

November 12, 2025

AI-powered financial scams swamp social media

September 11, 2025

Top IRS scams to look out for in 2026

February 10, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.