Cybersecurity experts have detected a malicious software campaign utilizing the PureCrypter loader to distribute the DarkVision RAT, a remote access trojan. Detected by Zscaler ThreatLabz in July 2024, this campaign features a multi-stage delivery process for the RAT payload. Security researcher Muhammed Irfan V A noted that "DarkVision RAT communicates with its command-and-control (C2) server using a custom network protocol via sockets," enabling functionalities such as keylogging, remote access, and password theft. First revealed in 2022, PureCrypter is an off-the-shelf malware loader available on a subscription basis, allowing for the distribution of various malware types. While the exact initial access method for PureCrypter and DarkVision RAT is unclear, it begins with a .NET executable that decrypts and launches the Donut loader. This loader activates PureCrypter, which unpacks and loads DarkVision RAT, establishing persistence through scheduled tasks and autorun keys. DarkVision RAT, priced as low as $60, attracts cybercriminals with limited technical skills. Developed in C++ and assembly for optimal performance, it includes features such as process injection, remote shell access, and browser password recovery. Zscaler describes it as a "powerful and adaptable tool," enhancing its appeal among attackers. This development coincides with the emergence of Pronsis Loader, associated with campaigns delivering Lumma Stealer and Latrodectus, which employs different installation methods compared to similar malware loaders like D3F@ck Loader.
IBM released security patches for over 100 vulnerabilities across various products. The biggest sufferers of these patches were Storage Defender, for which patches were issued for ...
Fieldtex Products, a U.S.-based provider of contract sewing and medical supply fulfillment, has reported a data breach following an attack attributed to a well-known ransomware ope...
The Pierce County Library System (PCLS) has announced a major data breach affecting more than 340,000 individuals, including library patrons, employees, former employees, and some ...