Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
PhantomVAI Loader Utilizes RunPE for Stealthy Attacks

PhantomVAI Loader Utilizes RunPE for Stealthy Attacks

Posted on February 4, 2026 By CWS

A new malware loader dubbed PhantomVAI has been identified in global phishing operations, distributing a range of stealers and remote access trojans (RATs) across compromised systems. This sophisticated loader mimics legitimate software, utilizing process hollowing to inject harmful payloads into Windows processes.

Phishing Campaigns and Global Impact

The PhantomVAI loader targets users worldwide through phishing tactics embedded in malicious emails and links. Once activated, the loader retrieves remote payloads and injects them into genuine Windows processes, significantly complicating their detection by security systems.

Notably, security researchers have reported this loader under various names across different organizations, causing confusion within the cybersecurity community regarding its exact nature and capabilities.

Technical Insights and Execution Mechanisms

Key to PhantomVAI’s operation is its use of a RunPE utility known as “Mandark,” originally developed by a HackForums user. This utility enables process hollowing by creating a suspended process, unmapping its memory, and injecting malicious code, all while maintaining a connection to its origin through the namespace “hackforums.gigajew.”

The loader exploits version 2.11.0.0 of the Microsoft Windows Task Scheduler library, extracting necessary data from payload headers and initiating a host process. It allocates memory with permissions to execute malicious payloads by injecting PE headers and sections.

Loader-as-a-Service Model and Widespread Attacks

The threat appears to operate under a loader-as-a-service model, as indicated by the diversity of payloads and the acceptance of arbitrary URLs as arguments. This model allows various threat actors to employ the same infrastructure for different malicious campaigns, enhancing the global spread of these attacks.

Researchers have identified critical shared features across documented instances, including the use of the “VAI” method and Portuguese strings, as well as disguising the loader as “Microsoft.Win32.TaskScheduler.dll” from a legitimate GitHub project.

Security analysts continue to study PhantomVAI, noting its capacity to deliver well-known threats like Remcos, XWorm, AsyncRAT, DarkCloud, and SmokeLoader across different regions.

Stay informed on the latest cybersecurity developments by following us on Google News, LinkedIn, and X. Set CSN as a preferred source in Google for instant updates.

Cyber Security News Tags:cyber threats, Cybersecurity, DarkCloud, Malware, malware loader, Microsoft Windows, PhantomVAI, Phishing, RATs, RunPE, security researchers, SmokeLoader

Post navigation

Previous Post: Microsoft Unveils Tool to Detect AI Model Backdoors
Next Post: Stealthy DEAD#VAX Malware Uses AsyncRAT via IPFS VHDs

Related Posts

INE Highlights Enterprise Shift Toward Hands-On Training as Skills Gaps Widen INE Highlights Enterprise Shift Toward Hands-On Training as Skills Gaps Widen Cyber Security News
5 Deception Solutions that are Changing the Cybersecurity Game  5 Deception Solutions that are Changing the Cybersecurity Game  Cyber Security News
Singularity Linux Kernel Rootkit with New Feature Prevents Detection Singularity Linux Kernel Rootkit with New Feature Prevents Detection Cyber Security News
10 Best Secure Network As a Service for MSP Providers 10 Best Secure Network As a Service for MSP Providers Cyber Security News
New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing Cyber Security News
Open VSX Registry Addresses Leaked Tokens and Malicious Extensions in Wake of Security Scare Open VSX Registry Addresses Leaked Tokens and Malicious Extensions in Wake of Security Scare Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News