Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Trojanized Gaming Tools Spread Java RAT via Online Platforms

Trojanized Gaming Tools Spread Java RAT via Online Platforms

Posted on February 27, 2026 By CWS

Cybersecurity experts have uncovered a disturbing trend where malicious actors are exploiting gaming utilities to propagate a sophisticated remote access trojan (RAT). This campaign involves trojanized gaming tools distributed through browsers and chat applications, aiming to compromise user security.

Methods of Distribution and Execution

According to a report by the Microsoft Threat Intelligence team, attackers employ a deceptive downloader that sets up a portable Java runtime environment and executes a harmful Java archive (JAR) file named jd-gui.jar. This downloader cleverly utilizes PowerShell scripts and living-off-the-land binaries (LOLBins) like cmstp.exe to conduct operations stealthily and avoid detection.

The attackers further obfuscate their activities by removing initial download traces and configuring Microsoft Defender exclusions for the RAT’s components. Persistence is maintained through scheduled tasks and a Windows startup script named “world.vbs,” ensuring the RAT remains active until the final payload is delivered to the compromised system.

Threat Analysis and Defense Strategies

Once installed, the RAT establishes a connection with an external command-and-control server at “79.110.49[.]15,” enabling the exfiltration of sensitive data and the download of additional malicious payloads. To counter this threat, users should audit Microsoft Defender exclusions and scheduled tasks, eliminate malicious scripts, isolate impacted endpoints, and reset credentials for affected users.

Further complicating the cybersecurity landscape, BlackFog has revealed a new Windows RAT malware family known as Steaelite, which emerged on the dark web in November 2025. Marketed as a “fully undetectable” tool, Steaelite integrates data theft and ransomware functionalities into a single interface, with an Android ransomware module under development.

Advanced Capabilities of Emerging RATs

Steaelite offers a comprehensive suite of features, including remote code execution, file management, live surveillance, and credential theft. It enables operators to control compromised Windows machines via a web-based dashboard, facilitating a range of malicious activities from file exfiltration to ransomware deployment.

Security researchers have also identified two additional RAT families, DesckVB RAT and KazakRAT, which allow extensive remote manipulation of infected hosts. Notably, KazakRAT is believed to be linked to a state-sponsored group targeting entities in Kazakhstan and Afghanistan, highlighting the global scale and political dimensions of these cyber threats.

With the rise of these sophisticated RATs, organizations must remain vigilant and invest in robust cybersecurity measures to protect their digital assets from evolving threats.

The Hacker News Tags:Cybersecurity, data theft, endpoint security, gaming tools, Java RAT, Malware, Microsoft Defender, Ransomware, remote access trojan, Steaelite RAT, Windows security

Post navigation

Previous Post: Critical Juniper Networks Flaw Risks PTX Series Routers
Next Post: Microsoft Defender Expands Security to Teams with URL Alerts

Related Posts

CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability The Hacker News
Sneeit WordPress RCE Exploited in the Wild While ICTBroadcast Bug Fuels Frost Botnet Attacks Sneeit WordPress RCE Exploited in the Wild While ICTBroadcast Bug Fuels Frost Botnet Attacks The Hacker News
Malicious Packages Target ASP.NET and npm Developers Malicious Packages Target ASP.NET and npm Developers The Hacker News
Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials The Hacker News
Key Findings from the Blue Report 2025 Key Findings from the Blue Report 2025 The Hacker News
Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical SharePoint Vulnerability Actively Exploited
  • Critical Vulnerabilities Found in FortiSandbox Platform
  • Critical Flaws in Synology VPN Client Demand Urgent Action
  • ShowDoc Vulnerability Exploited by Cybercriminals
  • CISA Alerts on Exploited Microsoft Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical SharePoint Vulnerability Actively Exploited
  • Critical Vulnerabilities Found in FortiSandbox Platform
  • Critical Flaws in Synology VPN Client Demand Urgent Action
  • ShowDoc Vulnerability Exploited by Cybercriminals
  • CISA Alerts on Exploited Microsoft Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark