• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

Researchers Expose SVG and PureRAT Phishing Threats Focusing on Ukraine and Vietnam

Admin by Admin
September 27, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Sep 26, 2025Ravie LakshmananMalware / Cryptocurrency

SVG and PureRAT Phishing

A brand new marketing campaign has been noticed impersonating Ukrainian authorities businesses in phishing assaults to ship CountLoader, which is then used to drop Amatera Stealer and PureMiner.

“The phishing emails comprise malicious Scalable Vector Graphics (SVG) recordsdata designed to trick recipients into opening dangerous attachments,” Fortinet FortiGuard Labs researcher Yurren Wan mentioned in a report shared with The Hacker Information.

Within the assault chains documented by the cybersecurity firm, the SVG recordsdata are used to provoke the obtain of a password-protected ZIP archive, which incorporates a Compiled HTML Assist (CHM) file. The CHM file, when launched, prompts a sequence of occasions that culminate within the deployment of CountLoader. The e-mail messages declare to be a discover from the Nationwide Police of Ukraine.

CountLoader, which was the topic of a latest evaluation by Silent Push, has been discovered to drop varied payloads like Cobalt Strike, AdaptixC2, and PureHVNC RAT. On this assault chain, nonetheless, it serves as a distribution vector for Amatera Stealer, a variant of ACRStealer, and PureMiner, a stealthy .NET cryptocurrency miner.

DFIR Retainer Services

It is value stating that each PureHVNC RAT and PureMiner are a part of a broader malware suite developed by a menace actor often known as PureCoder. A number of the different merchandise from the identical creator embrace –

  • PureCrypter, a crypter for Native and .NET
  • PureRAT (aka ResolverRAT), a successor to PureHVNC RAT
  • PureLogs, an info stealer and logger
  • BlueLoader, a malware that may act as a botnet by downloading and executing payloads remotely
  • PureClipper, a clipper malware that substitutes cryptocurrency addresses copied into the clipboard with attacker-controlled pockets addresses to redirect transactions and steal funds

In keeping with Fortinet, Amatera Stealer and PureMiner are each deployed as fileless threats, with the malware “executed by way of .NET Forward-of-Time (AOT) compilation with course of hollowing or loaded instantly into reminiscence utilizing PythonMemoryModule.”

Amatera Stealer, as soon as launched, gathers system info, collects recordsdata matching a predefined record of extensions, and harvests knowledge from Chromium- and Gecko-based browsers, in addition to purposes like Steam, Telegram, FileZilla, and varied cryptocurrency wallets.

“This phishing marketing campaign demonstrates how a malicious SVG file can act as an HTML substitute to provoke an an infection chain,” Fortinet mentioned. On this case, attackers focused Ukrainian authorities entities with emails containing SVG attachments. The SVG-embedded HTML code redirected victims to a obtain web site.”

The event comes as Huntress uncovered a probable Vietnamese-speaking menace group utilizing phishing emails bearing copyright infringement discover themes to trick recipients into launching ZIP archives that result in the deployment of PXA Stealer, which then evolves right into a multi-layered an infection sequence dropping PureRAT.

CIS Build Kits

“This marketing campaign demonstrates a transparent and deliberate development, beginning with a easy phishing lure and escalating via layers of in-memory loaders, protection evasion, and credential theft,” safety researcher James Northey mentioned. “The ultimate payload, PureRAT, represents the end result of this effort: a modular, professionally developed backdoor that provides the attacker full management over a compromised host.”

“Their development from amateurish obfuscation of their Python payloads to abusing commodity malware like PureRAT exhibits not simply persistence, but additionally hallmarks of a critical and maturing operator.”

Tags: exposePhishingPureRATResearchersSVGTargetingthreatsUkraineVietnam
Admin

Admin

Next Post
Android Cellphone Has A SIM Not Provisioned Error Message? This is What’s Occurring

Android Cellphone Has A SIM Not Provisioned Error Message? This is What's Occurring

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

How you can Monitor Google Maps Visitors in GA4

How you can Monitor Google Maps Visitors in GA4

March 13, 2026
Star Wars Outlaws Out On Change 2 In Days And Footage Is Being Saved Secret

Star Wars Outlaws Out On Change 2 In Days And Footage Is Being Saved Secret

August 31, 2025

Trending.

The way to Clear up the Wall Puzzle in The place Winds Meet

The way to Clear up the Wall Puzzle in The place Winds Meet

November 16, 2025
Mistral AI Releases Voxtral TTS: A 4B Open-Weight Streaming Speech Mannequin for Low-Latency Multilingual Voice Era

Mistral AI Releases Voxtral TTS: A 4B Open-Weight Streaming Speech Mannequin for Low-Latency Multilingual Voice Era

March 29, 2026
Google Introduces Simula: A Reasoning-First Framework for Producing Controllable, Scalable Artificial Datasets Throughout Specialised AI Domains

Google Introduces Simula: A Reasoning-First Framework for Producing Controllable, Scalable Artificial Datasets Throughout Specialised AI Domains

April 21, 2026
Google DeepMind Introduces Decoupled DiLoCo: An Asynchronous Coaching Structure Reaching 88% Goodput Below Excessive {Hardware} Failure Charges

Google DeepMind Introduces Decoupled DiLoCo: An Asynchronous Coaching Structure Reaching 88% Goodput Below Excessive {Hardware} Failure Charges

April 24, 2026
5 AI Compute Architectures Each Engineer Ought to Know: CPUs, GPUs, TPUs, NPUs, and LPUs In contrast

5 AI Compute Architectures Each Engineer Ought to Know: CPUs, GPUs, TPUs, NPUs, and LPUs In contrast

April 10, 2026

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

Hugging Face LeRobot Flaw Opens Door to Distant Code Execution Assaults

Hugging Face LeRobot Flaw Opens Door to Distant Code Execution Assaults

April 28, 2026
The AI Expertise Wage Premium

The AI Expertise Wage Premium

April 28, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved