Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Arcane Werewolf Hacker Group Added Loki 2.1 Malware Toolkit to their Arsenal

Arcane Werewolf Hacker Group Added Loki 2.1 Malware Toolkit to their Arsenal

Posted on December 22, 2025December 22, 2025 By CWS

The menace actor group often called Arcane Werewolf, additionally tracked as Mythic Likho, has refreshed its assault capabilities by deploying a brand new model of its customized malware referred to as Loki 2.1.

Throughout October and November 2025, researchers noticed this group launching campaigns particularly concentrating on Russian manufacturing corporations.

The group continues to refine its techniques, exhibiting a sustained curiosity within the manufacturing sector and demonstrating energetic improvement of its malware toolkit.

This newest model of Loki represents a big improve, because it now works with each the Mythic and Havoc post-exploitation frameworks, making it extra versatile and harmful within the fingers of skilled attackers.

The malware spreads by fastidiously crafted phishing emails that seem to come back from reliable manufacturing corporations.

Victims obtain messages containing hyperlinks that result in spoofed web sites imitating actual organizations. When clicked, these hyperlinks ship ZIP archives hosted on the attackers’ command and management servers.

This method works as a result of persons are extra more likely to belief emails after they appear to come back from acknowledged manufacturers and organizations. As soon as the sufferer downloads and opens the archive, the an infection chain begins.

Exfiltrated knowledge (Supply – Bi.Zone)

Bi.Zone analysts recognized the malware after monitoring the distribution technique and analyzing the an infection course of.

The assault begins when a sufferer opens a malicious shortcut file, or LNK file, hidden contained in the ZIP archive.

This file triggers a command that makes use of PowerShell to obtain an executable disguised as a picture file from the attacker’s server.

The downloaded file is definitely a dropper written within the Go programming language, which carries encoded payloads hidden inside it.

The Loki 2.1 An infection Mechanism

The Go dropper comprises two separate payloads that it decodes and executes in sequence. First, it drops a malicious loader referred to as chrome_proxy.pdf, which is accountable for speaking with the attacker’s command and management server.

The malicious loader gathers system info from the contaminated laptop, together with the pc title, working system model, inner IP addresses, and username.

Decoy contents (Supply – Bi.Zone)

This stolen knowledge is encrypted utilizing the AES encryption algorithm and despatched again to the attackers over HTTPS connections.

The loader then waits for instructions from the attackers, able to inject malicious code into working processes, add recordsdata to the sufferer’s system, or exfiltrate delicate knowledge.

Moreover, the loader can terminate particular processes on the contaminated laptop, giving attackers vital management over the system’s operation and permitting them to take away safety instruments or different software program that may intervene with their actions.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Added, Arcane, Arsenal, Group, Hacker, Loki, Malware, Toolkit, Werewolf

Post navigation

Previous Post: MacSync macOS Malware Distributed via Signed Swift Application
Next Post: Docker Open Sources Production-Ready Hardened Images for Free

Related Posts

CISA Alerts on Active Exploitation of Google Chromium Vulnerability CISA Alerts on Active Exploitation of Google Chromium Vulnerability Cyber Security News
ShadowV2 Botnet Exploits Docker Containers on AWS to Turn Thems as Infected System for DDoS Attack ShadowV2 Botnet Exploits Docker Containers on AWS to Turn Thems as Infected System for DDoS Attack Cyber Security News
Cl0P Ransomware Group Allegedly Claims Breach of Entrust in Oracle 0-Day EBS Hack Cl0P Ransomware Group Allegedly Claims Breach of Entrust in Oracle 0-Day EBS Hack Cyber Security News
TA829 Hackers Employs New TTPs and Upgraded RomCom Backdoor to Evade Detections TA829 Hackers Employs New TTPs and Upgraded RomCom Backdoor to Evade Detections Cyber Security News
CISA Shares New Threat Detections for Actively Exploited WSUS Vulnerability CISA Shares New Threat Detections for Actively Exploited WSUS Vulnerability Cyber Security News
MacOS Users Targeted by Malvertising with Malext Infostealer MacOS Users Targeted by Malvertising with Malext Infostealer Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark