Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ScarCruft Hacker Group Launched a New Malware Attack Using Rust and PubNub

Posted on August 7, 2025August 7, 2025 By CWS

The North Korean state-sponsored Superior Persistent Risk (APT) group ScarCruft has launched a classy new malware marketing campaign focusing on South Korean customers by means of a misleading postal-code replace discover.

This newest assault represents a big evolution within the group’s operational capabilities, marking the primary noticed deployment of ransomware alongside their conventional espionage instruments.

The marketing campaign showcases ScarCruft’s adoption of contemporary programming languages and progressive command-and-control infrastructure to reinforce detection evasion.

The assault chain begins with a malicious LNK file embedded inside a RAR archive, disguised as a respectable postal service notification.

Assault Move (Supply – Medium)

Upon execution, the LNK file deploys an AutoIt loader that subsequently fetches and executes a number of payloads from exterior servers, making a multi-stage an infection course of designed to bypass conventional safety measures.

This marketing campaign has been attributed to ChinopuNK, a specialised subgroup inside ScarCruft that focuses on distributing numerous malware strains by means of real-time messaging platforms.

S2W researchers recognized 9 distinct malware samples on this marketing campaign, with a number of representing notable technological advances for the risk group.

Essentially the most important additions embrace NubSpy, a backdoor leveraging PubNub for command-and-control communications, and CHILLYCHINO, a Rust-based backdoor tailored from earlier PowerShell variations.

ScarCruft Subgroup Classification (Supply – Medium)

The marketing campaign additionally launched VCD Ransomware, which encrypts sufferer recordsdata with a .VCD extension, marking ScarCruft’s first documented foray into ransomware deployment.

Technical Innovation and Detection Evasion

The adoption of Rust programming language for backdoor growth represents a strategic shift towards enhanced detection evasion capabilities.

CHILLYCHINO demonstrates ScarCruft’s dedication to modernizing their toolset by porting present PowerShell performance right into a compiled language that provides superior efficiency and diminished antivirus detection charges.

The malware makes use of PubNub’s respectable real-time messaging service as its command-and-control channel, permitting operators to mix malicious visitors with regular community communications.

// Instance Rust-based C2 communication construction
pub struct C2Channel {
pubnub_client: PubNub,
channel_id: String,
encryption_key: [u8; 32],
}

This marketing campaign’s technical sophistication, mixed with the deployment of ransomware capabilities, suggests ScarCruft could also be increasing past conventional espionage operations towards financially motivated actions, representing a regarding evolution in North Korean cyber warfare ways.

Equip your SOC with full entry to the newest risk information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Attack, Group, Hacker, Launched, Malware, PubNub, Rust, ScarCruft

Post navigation

Previous Post: Microsoft 365 Direct Send Weaponized to Bypass Email Security Defenses
Next Post: SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability

Related Posts

Palo Alto Networks to Acquire CyberArk in $25 Billion Deal Cyber Security News
3 Key Benefits For SOCs And MSSPs  Cyber Security News
AMOS macOS Stealer Hides in GitHub With Advanced Sophistication Methods Cyber Security News
Researchers Uncover New Technique to Exploit Azure Arc for Hybrid Escalation in Enterprise Environment and Maintain Persistence Cyber Security News
Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks Cyber Security News
F5 BIG-IP Command Injection Vulnerability Let Attackers Execute Arbitrary System Commands Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability
  • ScarCruft Hacker Group Launched a New Malware Attack Using Rust and PubNub
  • Microsoft 365 Direct Send Weaponized to Bypass Email Security Defenses
  • New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control
  • CISA Warns of ‘ToolShell’ Exploits Chain Attacks SharePoint Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • SonicWall Says Recent Attacks Don’t Involve Zero-Day Vulnerability
  • ScarCruft Hacker Group Launched a New Malware Attack Using Rust and PubNub
  • Microsoft 365 Direct Send Weaponized to Bypass Email Security Defenses
  • New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control
  • CISA Warns of ‘ToolShell’ Exploits Chain Attacks SharePoint Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News