Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
VOID#GEIST Malware Campaign Unveils Advanced RAT Delivery

VOID#GEIST Malware Campaign Unveils Advanced RAT Delivery

Posted on March 6, 2026 By CWS

In a recent disclosure, cybersecurity experts have detailed a sophisticated malware operation known as VOID#GEIST. This campaign employs batch scripts to deliver encrypted payloads of remote access trojans (RATs) such as XWorm, AsyncRAT, and Xeno RAT, marking a significant evolution in malware tactics.

Complex Attack Mechanism

VOID#GEIST employs a multi-layered strategy, starting with an obfuscated batch script. This script orchestrates the deployment of another batch script, establishes a legitimate embedded Python runtime, and decrypts shellcode, which is then injected into ‘explorer.exe’ using Early Bird Asynchronous Procedure Call (APC) injection. According to Securonix Threat Research, this approach mimics legitimate user activities, complicating detection.

The campaign shifts away from traditional executable files, opting instead for modular batch scripts and PowerShell commands. These methods enhance stealth and persistence, allowing operations to blend with regular administrative tasks. This fileless execution limits detection opportunities, enabling attackers to evade security systems effectively.

Initial Attack and Persistence

The attack begins with a batch script retrieved from a TryCloudflare domain, often distributed via phishing emails. This script capitalizes on the permissions of the current user without elevating privileges, ensuring the malware remains under the radar. It serves as a launchpad to display a decoy PDF using Google Chrome, distracting victims while executing malicious scripts in the background.

To maintain persistence, an auxiliary batch script is installed in the user’s Startup directory, running every time the system starts. This method avoids altering system-wide settings or creating noticeable alerts, thus reducing the risk of detection while maintaining a low forensic footprint.

Payload Deployment and Execution

Subsequent stages involve fetching additional payloads from TryCloudflare domains, delivered as ZIP files containing encrypted shellcode and decryption keys. The malware deploys a legitimate Python runtime, bypassing system dependencies and enhancing its stealth capabilities.

The primary objective is to execute the ‘runn.py’ script, which decrypts and activates the XWorm payload using the Early Bird APC injection method. The attack further utilizes ‘AppInstallerPythonRedirector.exe’ to launch Xeno RAT, while AsyncRAT is similarly deployed using scripted injections, maintaining its modular and adaptive architecture.

The operation concludes with a minimal HTTP beacon sent back to attacker-controlled infrastructure, confirming the breach. The identities of potential targets remain unknown, and the extent of successful infiltrations is yet to be determined.

Securonix highlights the modularity of this attack framework, where components are delivered in phases, enhancing both flexibility and resilience. The repeated process injections serve as behavioral indicators, offering clues to cybersecurity professionals for potential detection.

The Hacker News Tags:APC injection, AsyncRAT, Cybersecurity, fileless attack, Malware, Phishing, Python runtime, VOIDGEIST, Xeno RAT, XWorm

Post navigation

Previous Post: OpenAnt: AI Tool for Detecting Software Vulnerabilities
Next Post: Microsoft 365 North America Disruption Due to CDN Issue

Related Posts

Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability The Hacker News
Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit The Hacker News
Chinese AI Firms Accused of Copying Claude Using 16 Million Queries Chinese AI Firms Accused of Copying Claude Using 16 Million Queries The Hacker News
Hackers Target Critical Quest KACE SMA Vulnerability Hackers Target Critical Quest KACE SMA Vulnerability The Hacker News
New macOS XCSSET Variant Targets Firefox with Clipper and Persistence Module New macOS XCSSET Variant Targets Firefox with Clipper and Persistence Module The Hacker News
DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Progress Releases Vital Patches for MOVEit and LoadMaster
  • Boosting MTTR: Key Strategies of Advanced SOCs
  • Gentlemen RaaS Targets Multiple OS with Advanced Ransomware
  • Security Flaws in Perforce Servers Risk Sensitive Data
  • NGate Malware Exploits HandyPay App in Brazil for NFC Data Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Progress Releases Vital Patches for MOVEit and LoadMaster
  • Boosting MTTR: Key Strategies of Advanced SOCs
  • Gentlemen RaaS Targets Multiple OS with Advanced Ransomware
  • Security Flaws in Perforce Servers Risk Sensitive Data
  • NGate Malware Exploits HandyPay App in Brazil for NFC Data Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark