Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

xRAT Malware Attacking Windows Users Disguised as Adult Game

Posted on January 9, 2026January 9, 2026 By CWS

A harmful malware menace has emerged focusing on Home windows customers throughout Korea via webhard file-sharing companies.

The Ahnlab Safety Intelligence Middle just lately recognized xRAT, also called QuasarRAT, being distributed as pretend grownup video games to unsuspecting customers.

This distant entry trojan represents a major safety concern for Home windows techniques, combining subtle evasion strategies with social engineering ways that make it significantly harmful to on a regular basis customers.

The malware takes benefit of webhard companies, that are extraordinarily fashionable in Korea for distributing content material.

Menace actors exploit this platform’s accessibility by importing compressed information disguised as harmless video games and grownup content material.

Customers see what seems to be professional sport downloads however as an alternative obtain malicious information hidden behind engaging file names and descriptions.

This deception technique has confirmed extremely efficient, permitting attackers to compromise techniques with out elevating person suspicion throughout the preliminary obtain part.

Malicious file construction (Supply – ASEC)

ASEC analysts recognized that a number of related distributions occurred via the identical menace actor, suggesting a coordinated marketing campaign.

Though many posts have been deleted by the point of study, investigators confirmed that quite a few video games shared an identical malware payloads.

An infection and Persistence Mechanism

The technical construction of this assault reveals subtle engineering. When customers obtain the malware, they obtain a ZIP file containing a number of elements together with Recreation.exe, Data1.Pak, and supporting information.

Upon execution, Recreation.exe acts as a launcher somewhat than an precise sport utility.

When customers click on the play button, the malware copies Data1.Pak to the Locales_module folder as Play.exe, whereas concurrently deploying Data2.Pak and Data3.Pak to the Home windows Explorer listing path as GoogleUpdate.exe and WinUpdate.db respectively.

The an infection chain turns into extra advanced when GoogleUpdate.exe executes. It searches for WinUpdate.db in the identical listing and applies AES encryption decryption to extract the ultimate shellcode.

A part of the injection code (Supply – ASEC)

This shellcode will get injected into explorer.exe, a essential Home windows course of, permitting the malware to function with elevated privileges.

Notably, the malware patches the EtwEventWrite perform in explorer.exe with a particular return instruction, successfully disabling Occasion Tracing for Home windows logging.

This persistence method prevents safety instruments and directors from detecting malicious exercise via commonplace occasion logs.

The ultimate injected code is the precise xRAT payload, which performs harmful operations together with system info assortment, keyboard monitoring, and unauthorized file transfers.

Safety professionals suggest downloading packages completely from official sources and exercising excessive warning when accessing file-sharing web sites to forestall such infections.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Adult, Attacking, Disguised, Game, Malware, Users, Windows, xRAT

Post navigation

Previous Post: Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
Next Post: China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines

Related Posts

New Albiriox Malware Attacking Android Users to Take Complete Control of their Device Cyber Security News
Microsoft Azure Faces Global Outage Affecting Services Worldwide Cyber Security News
Happy DOM Vulnerability Exposes 2.7 Million Users To Remote Code Execution Attacks Cyber Security News
IRGC Hacker Groups Attacking Targeted Financial, Government, and Media Organizations Cyber Security News
SetupHijack Tool Exploits Race Conditions and Insecure File Handling in Windows Installer Processes Cyber Security News
CISA Warns of WhatsApp 0-Day Vulnerability Exploited in Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark