Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Trojanized Gaming Tools Spread Java RAT via Online Platforms

Trojanized Gaming Tools Spread Java RAT via Online Platforms

Posted on February 27, 2026 By CWS

Cybersecurity experts have uncovered a disturbing trend where malicious actors are exploiting gaming utilities to propagate a sophisticated remote access trojan (RAT). This campaign involves trojanized gaming tools distributed through browsers and chat applications, aiming to compromise user security.

Methods of Distribution and Execution

According to a report by the Microsoft Threat Intelligence team, attackers employ a deceptive downloader that sets up a portable Java runtime environment and executes a harmful Java archive (JAR) file named jd-gui.jar. This downloader cleverly utilizes PowerShell scripts and living-off-the-land binaries (LOLBins) like cmstp.exe to conduct operations stealthily and avoid detection.

The attackers further obfuscate their activities by removing initial download traces and configuring Microsoft Defender exclusions for the RAT’s components. Persistence is maintained through scheduled tasks and a Windows startup script named “world.vbs,” ensuring the RAT remains active until the final payload is delivered to the compromised system.

Threat Analysis and Defense Strategies

Once installed, the RAT establishes a connection with an external command-and-control server at “79.110.49[.]15,” enabling the exfiltration of sensitive data and the download of additional malicious payloads. To counter this threat, users should audit Microsoft Defender exclusions and scheduled tasks, eliminate malicious scripts, isolate impacted endpoints, and reset credentials for affected users.

Further complicating the cybersecurity landscape, BlackFog has revealed a new Windows RAT malware family known as Steaelite, which emerged on the dark web in November 2025. Marketed as a “fully undetectable” tool, Steaelite integrates data theft and ransomware functionalities into a single interface, with an Android ransomware module under development.

Advanced Capabilities of Emerging RATs

Steaelite offers a comprehensive suite of features, including remote code execution, file management, live surveillance, and credential theft. It enables operators to control compromised Windows machines via a web-based dashboard, facilitating a range of malicious activities from file exfiltration to ransomware deployment.

Security researchers have also identified two additional RAT families, DesckVB RAT and KazakRAT, which allow extensive remote manipulation of infected hosts. Notably, KazakRAT is believed to be linked to a state-sponsored group targeting entities in Kazakhstan and Afghanistan, highlighting the global scale and political dimensions of these cyber threats.

With the rise of these sophisticated RATs, organizations must remain vigilant and invest in robust cybersecurity measures to protect their digital assets from evolving threats.

The Hacker News Tags:Cybersecurity, data theft, endpoint security, gaming tools, Java RAT, Malware, Microsoft Defender, Ransomware, remote access trojan, Steaelite RAT, Windows security

Post navigation

Previous Post: Critical Juniper Networks Flaw Risks PTX Series Routers
Next Post: Microsoft Defender Expands Security to Teams with URL Alerts

Related Posts

MSS Claims NSA Used 42 Cyber Tools in Multi-Stage Attack on Beijing Time Systems MSS Claims NSA Used 42 Cyber Tools in Multi-Stage Attack on Beijing Time Systems The Hacker News
OpenSSL Vulnerabilities and Emerging Cyber Threats OpenSSL Vulnerabilities and Emerging Cyber Threats The Hacker News
Infostealer Targets OpenClaw AI, Exposes Security Flaws Infostealer Targets OpenClaw AI, Exposes Security Flaws The Hacker News
An Anti-Sales Guide for MSPs An Anti-Sales Guide for MSPs The Hacker News
LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem The Hacker News
CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerabilities Found in FortiSandbox Platform
  • Critical Flaws in Synology VPN Client Demand Urgent Action
  • ShowDoc Vulnerability Exploited by Cybercriminals
  • CISA Alerts on Exploited Microsoft Vulnerabilities
  • April 2026 Microsoft Patch Tuesday: Key Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerabilities Found in FortiSandbox Platform
  • Critical Flaws in Synology VPN Client Demand Urgent Action
  • ShowDoc Vulnerability Exploited by Cybercriminals
  • CISA Alerts on Exploited Microsoft Vulnerabilities
  • April 2026 Microsoft Patch Tuesday: Key Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark