The menace actor group often called Arcane Werewolf, additionally tracked as Mythic Likho, has refreshed its assault capabilities by deploying a brand new model of its customized malware referred to as Loki 2.1.
Throughout October and November 2025, researchers noticed this group launching campaigns particularly concentrating on Russian manufacturing corporations.
The group continues to refine its techniques, exhibiting a sustained curiosity within the manufacturing sector and demonstrating energetic improvement of its malware toolkit.
This newest model of Loki represents a big improve, because it now works with each the Mythic and Havoc post-exploitation frameworks, making it extra versatile and harmful within the fingers of skilled attackers.
The malware spreads by fastidiously crafted phishing emails that seem to come back from reliable manufacturing corporations.
Victims obtain messages containing hyperlinks that result in spoofed web sites imitating actual organizations. When clicked, these hyperlinks ship ZIP archives hosted on the attackers’ command and management servers.
This method works as a result of persons are extra more likely to belief emails after they appear to come back from acknowledged manufacturers and organizations. As soon as the sufferer downloads and opens the archive, the an infection chain begins.
Exfiltrated knowledge (Supply – Bi.Zone)
Bi.Zone analysts recognized the malware after monitoring the distribution technique and analyzing the an infection course of.
The assault begins when a sufferer opens a malicious shortcut file, or LNK file, hidden contained in the ZIP archive.
This file triggers a command that makes use of PowerShell to obtain an executable disguised as a picture file from the attacker’s server.
The downloaded file is definitely a dropper written within the Go programming language, which carries encoded payloads hidden inside it.
The Loki 2.1 An infection Mechanism
The Go dropper comprises two separate payloads that it decodes and executes in sequence. First, it drops a malicious loader referred to as chrome_proxy.pdf, which is accountable for speaking with the attacker’s command and management server.
The malicious loader gathers system info from the contaminated laptop, together with the pc title, working system model, inner IP addresses, and username.
Decoy contents (Supply – Bi.Zone)
This stolen knowledge is encrypted utilizing the AES encryption algorithm and despatched again to the attackers over HTTPS connections.
The loader then waits for instructions from the attackers, able to inject malicious code into working processes, add recordsdata to the sufferer’s system, or exfiltrate delicate knowledge.
Moreover, the loader can terminate particular processes on the contaminated laptop, giving attackers vital management over the system’s operation and permitting them to take away safety instruments or different software program that may intervene with their actions.
Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.
