Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
PhantomVAI Loader Utilizes RunPE for Stealthy Attacks

PhantomVAI Loader Utilizes RunPE for Stealthy Attacks

Posted on February 4, 2026 By CWS

A new malware loader dubbed PhantomVAI has been identified in global phishing operations, distributing a range of stealers and remote access trojans (RATs) across compromised systems. This sophisticated loader mimics legitimate software, utilizing process hollowing to inject harmful payloads into Windows processes.

Phishing Campaigns and Global Impact

The PhantomVAI loader targets users worldwide through phishing tactics embedded in malicious emails and links. Once activated, the loader retrieves remote payloads and injects them into genuine Windows processes, significantly complicating their detection by security systems.

Notably, security researchers have reported this loader under various names across different organizations, causing confusion within the cybersecurity community regarding its exact nature and capabilities.

Technical Insights and Execution Mechanisms

Key to PhantomVAI’s operation is its use of a RunPE utility known as “Mandark,” originally developed by a HackForums user. This utility enables process hollowing by creating a suspended process, unmapping its memory, and injecting malicious code, all while maintaining a connection to its origin through the namespace “hackforums.gigajew.”

The loader exploits version 2.11.0.0 of the Microsoft Windows Task Scheduler library, extracting necessary data from payload headers and initiating a host process. It allocates memory with permissions to execute malicious payloads by injecting PE headers and sections.

Loader-as-a-Service Model and Widespread Attacks

The threat appears to operate under a loader-as-a-service model, as indicated by the diversity of payloads and the acceptance of arbitrary URLs as arguments. This model allows various threat actors to employ the same infrastructure for different malicious campaigns, enhancing the global spread of these attacks.

Researchers have identified critical shared features across documented instances, including the use of the “VAI” method and Portuguese strings, as well as disguising the loader as “Microsoft.Win32.TaskScheduler.dll” from a legitimate GitHub project.

Security analysts continue to study PhantomVAI, noting its capacity to deliver well-known threats like Remcos, XWorm, AsyncRAT, DarkCloud, and SmokeLoader across different regions.

Stay informed on the latest cybersecurity developments by following us on Google News, LinkedIn, and X. Set CSN as a preferred source in Google for instant updates.

Cyber Security News Tags:cyber threats, Cybersecurity, DarkCloud, Malware, malware loader, Microsoft Windows, PhantomVAI, Phishing, RATs, RunPE, security researchers, SmokeLoader

Post navigation

Previous Post: Microsoft Unveils Tool to Detect AI Model Backdoors
Next Post: Stealthy DEAD#VAX Malware Uses AsyncRAT via IPFS VHDs

Related Posts

Nisos Details Earlier Signs of Insider Detection via Authentication and Access Controls Nisos Details Earlier Signs of Insider Detection via Authentication and Access Controls Cyber Security News
AI Pentesting Tool that Autonomously Checks for Code Vulnerabilities and Executes Real Exploits AI Pentesting Tool that Autonomously Checks for Code Vulnerabilities and Executes Real Exploits Cyber Security News
Microsoft Fixes Windows 11 24H2 Audio Issue that Stops Bluetooth Headsets and Speakers Working Microsoft Fixes Windows 11 24H2 Audio Issue that Stops Bluetooth Headsets and Speakers Working Cyber Security News
Threat Actors Leverage Real Enterprise Email Threads to Deliver Phishing Links Threat Actors Leverage Real Enterprise Email Threads to Deliver Phishing Links Cyber Security News
Cloudflare Global Outage Breaks Internet Cloudflare Global Outage Breaks Internet Cyber Security News
PoC Exploit Released HPE OneView Vulnerability that Enables Remote Code Execution PoC Exploit Released HPE OneView Vulnerability that Enables Remote Code Execution Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark