Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
PhantomVAI Loader Utilizes RunPE for Stealthy Attacks

PhantomVAI Loader Utilizes RunPE for Stealthy Attacks

Posted on February 4, 2026 By CWS

A new malware loader dubbed PhantomVAI has been identified in global phishing operations, distributing a range of stealers and remote access trojans (RATs) across compromised systems. This sophisticated loader mimics legitimate software, utilizing process hollowing to inject harmful payloads into Windows processes.

Phishing Campaigns and Global Impact

The PhantomVAI loader targets users worldwide through phishing tactics embedded in malicious emails and links. Once activated, the loader retrieves remote payloads and injects them into genuine Windows processes, significantly complicating their detection by security systems.

Notably, security researchers have reported this loader under various names across different organizations, causing confusion within the cybersecurity community regarding its exact nature and capabilities.

Technical Insights and Execution Mechanisms

Key to PhantomVAI’s operation is its use of a RunPE utility known as “Mandark,” originally developed by a HackForums user. This utility enables process hollowing by creating a suspended process, unmapping its memory, and injecting malicious code, all while maintaining a connection to its origin through the namespace “hackforums.gigajew.”

The loader exploits version 2.11.0.0 of the Microsoft Windows Task Scheduler library, extracting necessary data from payload headers and initiating a host process. It allocates memory with permissions to execute malicious payloads by injecting PE headers and sections.

Loader-as-a-Service Model and Widespread Attacks

The threat appears to operate under a loader-as-a-service model, as indicated by the diversity of payloads and the acceptance of arbitrary URLs as arguments. This model allows various threat actors to employ the same infrastructure for different malicious campaigns, enhancing the global spread of these attacks.

Researchers have identified critical shared features across documented instances, including the use of the “VAI” method and Portuguese strings, as well as disguising the loader as “Microsoft.Win32.TaskScheduler.dll” from a legitimate GitHub project.

Security analysts continue to study PhantomVAI, noting its capacity to deliver well-known threats like Remcos, XWorm, AsyncRAT, DarkCloud, and SmokeLoader across different regions.

Stay informed on the latest cybersecurity developments by following us on Google News, LinkedIn, and X. Set CSN as a preferred source in Google for instant updates.

Cyber Security News Tags:cyber threats, Cybersecurity, DarkCloud, Malware, malware loader, Microsoft Windows, PhantomVAI, Phishing, RATs, RunPE, security researchers, SmokeLoader

Post navigation

Previous Post: Microsoft Unveils Tool to Detect AI Model Backdoors
Next Post: Stealthy DEAD#VAX Malware Uses AsyncRAT via IPFS VHDs

Related Posts

Hackers Allegedly Selling WinRAR 0-day Exploit on Dark Web Forums for ,000 Hackers Allegedly Selling WinRAR 0-day Exploit on Dark Web Forums for $80,000 Cyber Security News
Attackers Infrastructure Exposed Using JA3 Fingerprinting Tool Attackers Infrastructure Exposed Using JA3 Fingerprinting Tool Cyber Security News
Operation ForumTrol Known for Exploiting Chrome 0-Day Attacking Users With New Phishing Campaign Operation ForumTrol Known for Exploiting Chrome 0-Day Attacking Users With New Phishing Campaign Cyber Security News
New Botnet Hijacks 9,000 ASUS Routers & Enables SSH Access by Injecting Public Key New Botnet Hijacks 9,000 ASUS Routers & Enables SSH Access by Injecting Public Key Cyber Security News
ESET Warns AI-driven Malware Attack and Rapidly Growing Ransomware Economy ESET Warns AI-driven Malware Attack and Rapidly Growing Ransomware Economy Cyber Security News
Microsoft Defender Vulnerability Allows Attackers to Elevate Privileges Microsoft Defender Vulnerability Allows Attackers to Elevate Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Interlock Ransomware Utilizes Zero-Day to Evade Security
  • Stealthy DEAD#VAX Malware Uses AsyncRAT via IPFS VHDs
  • PhantomVAI Loader Utilizes RunPE for Stealthy Attacks
  • Microsoft Unveils Tool to Detect AI Model Backdoors
  • SystemBC Botnet Expands to 10,000 Devices for Global Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Interlock Ransomware Utilizes Zero-Day to Evade Security
  • Stealthy DEAD#VAX Malware Uses AsyncRAT via IPFS VHDs
  • PhantomVAI Loader Utilizes RunPE for Stealthy Attacks
  • Microsoft Unveils Tool to Detect AI Model Backdoors
  • SystemBC Botnet Expands to 10,000 Devices for Global Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark