Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Arcane Werewolf Hacker Group Added Loki 2.1 Malware Toolkit to their Arsenal

Posted on December 22, 2025December 22, 2025 By CWS

The menace actor group often called Arcane Werewolf, additionally tracked as Mythic Likho, has refreshed its assault capabilities by deploying a brand new model of its customized malware referred to as Loki 2.1.

Throughout October and November 2025, researchers noticed this group launching campaigns particularly concentrating on Russian manufacturing corporations.

The group continues to refine its techniques, exhibiting a sustained curiosity within the manufacturing sector and demonstrating energetic improvement of its malware toolkit.

This newest model of Loki represents a big improve, because it now works with each the Mythic and Havoc post-exploitation frameworks, making it extra versatile and harmful within the fingers of skilled attackers.

The malware spreads by fastidiously crafted phishing emails that seem to come back from reliable manufacturing corporations.

Victims obtain messages containing hyperlinks that result in spoofed web sites imitating actual organizations. When clicked, these hyperlinks ship ZIP archives hosted on the attackers’ command and management servers.

This method works as a result of persons are extra more likely to belief emails after they appear to come back from acknowledged manufacturers and organizations. As soon as the sufferer downloads and opens the archive, the an infection chain begins.

Exfiltrated knowledge (Supply – Bi.Zone)

Bi.Zone analysts recognized the malware after monitoring the distribution technique and analyzing the an infection course of.

The assault begins when a sufferer opens a malicious shortcut file, or LNK file, hidden contained in the ZIP archive.

This file triggers a command that makes use of PowerShell to obtain an executable disguised as a picture file from the attacker’s server.

The downloaded file is definitely a dropper written within the Go programming language, which carries encoded payloads hidden inside it.

The Loki 2.1 An infection Mechanism

The Go dropper comprises two separate payloads that it decodes and executes in sequence. First, it drops a malicious loader referred to as chrome_proxy.pdf, which is accountable for speaking with the attacker’s command and management server.

The malicious loader gathers system info from the contaminated laptop, together with the pc title, working system model, inner IP addresses, and username.

Decoy contents (Supply – Bi.Zone)

This stolen knowledge is encrypted utilizing the AES encryption algorithm and despatched again to the attackers over HTTPS connections.

The loader then waits for instructions from the attackers, able to inject malicious code into working processes, add recordsdata to the sufferer’s system, or exfiltrate delicate knowledge.

Moreover, the loader can terminate particular processes on the contaminated laptop, giving attackers vital management over the system’s operation and permitting them to take away safety instruments or different software program that may intervene with their actions.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Added, Arcane, Arsenal, Group, Hacker, Loki, Malware, Toolkit, Werewolf

Post navigation

Previous Post: MacSync macOS Malware Distributed via Signed Swift Application
Next Post: Docker Open Sources Production-Ready Hardened Images for Free

Related Posts

CISA Warns of Git Arbitrary File Write Vulnerability Exploited in Attacks Cyber Security News
New MacSync Stealer Malware Attacking macOS Users Using Digitally Signed Apps Cyber Security News
Critical Meshtastic Vulnerability Let Attackers to Decrypt Private Messages Cyber Security News
FortiDDoS OS Command Injection Vulnerability Let Attackers Execute Unauthorized Commands Cyber Security News
Dark Partners Hackers Group Wiping Crypto Wallets With Fake Ai Tools and VPN Services Cyber Security News
SideWinder Hacker Group Hosting Fake Outlook/Zimbra Portals to Steal Login Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Teams to Enforce Messaging Safety Defaults Starting January 2026
  • Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites
  • ServiceNow to Acquire Armis for $7.75 Billion in Cash
  • HardBit 4.0 Ransomware Actors Attack Open RDP and SMB Services to Persist Access
  • Indian Income Tax-Themed Attacking Businesses with a Multi-Stage Infection Chain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Teams to Enforce Messaging Safety Defaults Starting January 2026
  • Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites
  • ServiceNow to Acquire Armis for $7.75 Billion in Cash
  • HardBit 4.0 Ransomware Actors Attack Open RDP and SMB Services to Persist Access
  • Indian Income Tax-Themed Attacking Businesses with a Multi-Stage Infection Chain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark