Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Matanbuchus 3.0 Emerges with Advanced Tactics to Deliver AstarionRAT

Matanbuchus 3.0 Emerges with Advanced Tactics to Deliver AstarionRAT

Posted on February 18, 2026 By CWS

Matanbuchus 3.0 has reentered the cybersecurity landscape in February 2026 after a lengthy absence. This latest version, fully rewritten, now commands a steep subscription fee of $15,000 monthly, indicating a shift towards high-value, targeted operations rather than broad spam campaigns.

ClickFix Social Engineering

The malware employs the ‘ClickFix’ social engineering tactic, misleading users into executing harmful commands by presenting them as solutions to fictitious browser errors or software updates. This approach circumvents traditional security measures by exploiting trust rather than software vulnerabilities.

Victims receive deceptive prompts urging them to copy and paste specific commands into PowerShell or Run dialogs. The URLs used confuse logging systems with backslashes and path traversal sequences. As the user initiates the process, many standard defenses are bypassed, leading to a silent installation without any visible interface.

AstarionRAT Delivery

Security analysts at Huntress have identified that Matanbuchus 3.0’s campaign delivers a novel payload known as AstarionRAT post-infection. This remote access trojan boasts 24 commands, including credential theft and SOCKS5 proxying, allowing operators to quickly move laterally within networks to target domain controllers, often with the intent of deploying ransomware or stealing data.

The infection mechanism is sophisticated, beginning with a mixed-case msiexec command fetching a payload from a newly registered domain. A legitimate yet vulnerable antivirus binary is then deployed alongside a malicious DLL in directories mimicking reputable vendors, further complicating detection.

Evading Detection

To obscure its actions, the malware uses a renamed version of 7-Zip to extract password-protected archives containing subsequent components. The malicious DLL, side-loaded by the antivirus engine, decrypts the Matanbuchus loader, launching an embedded Lua interpreter that executes the final AstarionRAT payload directly into memory, minimizing forensic traces.

Security teams are advised to configure endpoint detection systems to flag msiexec commands with mixed-case characters or suspect URLs. Monitoring for unusual directories in %APPDATA% and verifying connections to recently registered domains is crucial. Employee training to avoid pasting raw commands into terminals is also essential.

For more updates on cybersecurity threats and defenses, follow us on Google News, LinkedIn, and X, and set CSN as a preferred news source on Google.

Cyber Security News Tags:AstarionRAT, ClickFix, cyber attack, Cybersecurity, Malware, malware-as-a-service, Matanbuchus, remote access trojan, security threat, silent installation, social engineering

Post navigation

Previous Post: Dell Vulnerability Exploited by Chinese Hackers Since 2024
Next Post: Critical Flaw in Windows Admin Center Enables Privilege Escalation

Related Posts

APT41 Hackers Using Google Calendar for Malware Command-and-Control To Attack Government Entities APT41 Hackers Using Google Calendar for Malware Command-and-Control To Attack Government Entities Cyber Security News
Criminal IP and Palo Alto Networks Cortex XSOAR Integrate to Deliver AI-Driven Exposure Intelligence Criminal IP and Palo Alto Networks Cortex XSOAR Integrate to Deliver AI-Driven Exposure Intelligence Cyber Security News
CISA Releases BRICKSTORM Malware Report with New YARA Rules for VMware vSphere CISA Releases BRICKSTORM Malware Report with New YARA Rules for VMware vSphere Cyber Security News
ToolShell Exploit Chain Attacking SharePoint Servers to Gain Complete Control ToolShell Exploit Chain Attacking SharePoint Servers to Gain Complete Control Cyber Security News
PoC Exploit Released for Fortinet 0-Day Vulnerability that Allows Remote Code Execution PoC Exploit Released for Fortinet 0-Day Vulnerability that Allows Remote Code Execution Cyber Security News
European Airport Disruptions Caused by Sophisticated Ransomware Attack European Airport Disruptions Caused by Sophisticated Ransomware Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Flaw in Popular VS Code Extension Exposes Developers
  • Notepad++ Secures Update Process Against Malware Threat
  • CISA Alerts on Active Exploitation of Google Chromium Vulnerability
  • Palo Alto Networks to Acquire Koi for Enhanced AI Security
  • CRESCENTHARVEST Malware Targets Iran Protesters

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Flaw in Popular VS Code Extension Exposes Developers
  • Notepad++ Secures Update Process Against Malware Threat
  • CISA Alerts on Active Exploitation of Google Chromium Vulnerability
  • Palo Alto Networks to Acquire Koi for Enhanced AI Security
  • CRESCENTHARVEST Malware Targets Iran Protesters

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News