Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Dual Malware Campaign Deploys Gh0st RAT and Adware

Dual Malware Campaign Deploys Gh0st RAT and Adware

Posted on April 20, 2026 By CWS

A recent malware campaign is causing alarm in the cybersecurity field by simultaneously distributing two distinct types of threats. Utilizing a single, obfuscated loader, attackers are deploying both the Gh0st Remote Access Trojan (RAT) and CloverPlus adware onto compromised systems. This dual approach allows attackers long-term access while capitalizing on the infected device immediately.

Understanding the Dual Threat Strategy

This combination of threats is both unusual and strategic. The Gh0st RAT is a notorious tool that grants full control of a compromised system, while the CloverPlus adware alters browser settings, installs unwanted ad components, and generates pop-up ads for profit. Together, they provide attackers with a backdoor for persistent access and a method to monetize the infection in real time.

The campaign signifies a shift towards multi-payload delivery tactics aimed at maximizing the benefits from a single system breach. Researchers from the Splunk Threat Research Team (STRT) discovered the loader, noting its use of obfuscation to conceal encrypted payloads, which complicates detection by standard security measures.

Technical Insights Into the Malware Loader

The loader central to this campaign employs stealth from the outset, hiding two encrypted payloads within its resources. The first payload, CloverPlus adware, is linked to an executable named ‘wiseman.exe’ and is responsible for altering browser startup pages and inserting pop-up ads. The loader checks its file path, dropping a copy into the %temp% folder if necessary, before moving to decrypt the Gh0st RAT client module.

Post-decryption, the malware uses the Windows application ‘rundll32.exe’ to launch the Gh0st RAT, allowing it to operate under a trusted system process and evade security alerts. Gh0st RAT then gathers system information to uniquely identify the infected host within the attacker’s command-and-control infrastructure.

Implications and Defensive Measures

This malware campaign poses significant risks to both individuals and organizations. The adware can disrupt browser functionality and expose users to malicious ads, while the RAT component can steal sensitive information and provide attackers with persistent system access. Security teams are advised to enhance their endpoint monitoring capabilities and update detection rules to counteract this bundled threat.

To maintain persistence, Gh0st RAT uses various methods, including writing itself to the Windows Run registry key and integrating into the Windows Remote Access service, ensuring SYSTEM-level privileges with each service initiation. Monitoring for unusual ‘rundll32.exe’ activities, registry changes, and unexpected system hosts file modifications is crucial for detecting this malware. Regular updates to endpoint detection rules in line with MITRE ATT&CK techniques are recommended to mitigate the risks associated with this campaign.

Stay informed by following us on Google News, LinkedIn, and X. Set CSN as a preferred source on Google to receive more updates.

Cyber Security News Tags:ad fraud, Adware, cyber threats, Cybersecurity, data theft, endpoint monitoring, Gh0st RAT, Malware, MITRE ATT&CK, multi-payload, Obfuscation, security tools, Splunk STRT

Post navigation

Previous Post: North Korean Hackers Exploit Fake Meetings to Target Crypto Experts
Next Post: Hackers Exploit Intel Utility for Covert Malware Deployment

Related Posts

CISA Warns of Microsoft SharePoint Code Injection and Authentication Vulnerability Exploited in Wild CISA Warns of Microsoft SharePoint Code Injection and Authentication Vulnerability Exploited in Wild Cyber Security News
Michael Henricks Appointed CFO and COO at One Identity Michael Henricks Appointed CFO and COO at One Identity Cyber Security News
Windows Common Log File System 0-Day Vulnerability Actively Exploited in the Wild Windows Common Log File System 0-Day Vulnerability Actively Exploited in the Wild Cyber Security News
Penetration Testing in the AI Era Tools and Techniques Penetration Testing in the AI Era Tools and Techniques Cyber Security News
Hackers Using CastleRAT Malware to Attack Windows Systems and Gain Remote Access Hackers Using CastleRAT Malware to Attack Windows Systems and Gain Remote Access Cyber Security News
Critical ExifTool Vulnerability Exposes macOS to Hidden Threats Critical ExifTool Vulnerability Exposes macOS to Hidden Threats Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Teams Outage: Desktop Client Update Rollback Efforts
  • JanaWare Ransomware Targets Turkish Users with Adwind RAT
  • Hackers Exploit Intel Utility for Covert Malware Deployment
  • Dual Malware Campaign Deploys Gh0st RAT and Adware
  • North Korean Hackers Exploit Fake Meetings to Target Crypto Experts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Teams Outage: Desktop Client Update Rollback Efforts
  • JanaWare Ransomware Targets Turkish Users with Adwind RAT
  • Hackers Exploit Intel Utility for Covert Malware Deployment
  • Dual Malware Campaign Deploys Gh0st RAT and Adware
  • North Korean Hackers Exploit Fake Meetings to Target Crypto Experts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark