Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader

Posted on September 18, 2025September 18, 2025 By CWS

Cybersecurity researchers have found a brand new malware loader codenamed CountLoader that has been put to make use of by Russian ransomware gangs to ship post-exploitation instruments like Cobalt Strike and AdaptixC2, and a distant entry trojan generally known as PureHVNC RAT.
“CountLoader is getting used both as a part of an Preliminary Entry Dealer’s (IAB) toolset or by a ransomware affiliate with ties to the LockBit, Black Basta, and Qilin ransomware teams,” Silent Push mentioned in an evaluation.
Showing in three totally different variations – .NET, PowerShell, and JavaScript – the rising menace has been noticed in a marketing campaign concentrating on people in Ukraine utilizing PDF-based phishing lures and impersonating the Nationwide Police of Ukraine.
It is price noting that the PowerShell model of the malware was beforehand flagged by Kaspersky as being distributed utilizing DeepSeek-related decoys to trick customers into putting in it.

The assaults, per the Russian cybersecurity vendor, led to the deployment of an implant named BrowserVenom that may reconfigure all shopping situations to drive site visitors via a proxy managed by the menace actors, enabling the attackers to control community site visitors and accumulate knowledge.
Silent Push’s investigation has discovered the JavaScript model is essentially the most fleshed out implementation of the loader, providing six totally different strategies for file downloading, three totally different strategies for executing numerous malware binaries, and a predefined operate to establish a sufferer’s system primarily based on Home windows area info.
The malware can be able to gathering system info, establishing persistence on the host by making a scheduled activity that impersonates a Google replace activity for the Chrome internet browser, and connecting to a distant server to await additional directions.
This contains the power to obtain and run DLL and MSI installer payloads utilizing rundll32.exe and msiexec.exe, transmit system metadata, and delete the created scheduled activity. The six strategies used to obtain recordsdata contain the usage of curl, PowerShell, MSXML2.XMLHTTP, WinHTTP.WinHttpRequest.5.1, bitsadmin, and certutil.exe.

“By utilizing LOLBins like ‘certutil’ and ‘bitsadmin,’ and by implementing an ‘on the fly’ command encryption PowerShell generator, CountLoader’s builders show right here a complicated understanding of the Home windows working system and malware growth,” Silent Push mentioned.
A notable side of CountLoader is its use of the sufferer’s Music folder as a staging floor for malware. The .NET taste shares a point of practical crossover with its JavaScript counterpart, however helps solely two several types of instructions (UpdateType.Zip or UpdateType.Exe), indicating a diminished, stripped-down model.
CountLoader is supported by an infrastructure comprising over 20 distinctive domains, with the malware serving as a conduit for Cobalt Strike, AdaptixC2, and PureHVNC RAT, the final of which is a industrial providing from a menace actor generally known as PureCoder. It is price declaring that PureHVNC RAT is a predecessor to PureRAT, which can be known as ResolverRAT.
Latest campaigns distributing PureHVNC RAT have leveraged the tried-and-tested ClickFix social engineering tactic as a supply vector, with victims lured to the ClickFix phishing web page via pretend job affords, per Examine Level. The trojan is deployed via a Rust-based loader.

“The attacker lured the sufferer via pretend job ads, permitting the attacker to execute malicious PowerShell code via the ClickFix phishing method,” the cybersecurity firm mentioned, describing PureCoder as utilizing a revolving set of GitHub accounts to host recordsdata that assist the performance of PureRAT.

Evaluation of the GitHub commits has revealed that exercise was carried out from the timezone UTC+03:00, which corresponds to many nations, together with Russia, amongst others.
The event comes because the DomainTools Investigations workforce has uncovered the interconnected nature of the Russian ransomware panorama, figuring out menace actor actions throughout teams and the usage of instruments like AnyDesk and Fast Help, suggesting operational overlaps.
“Model allegiance amongst these operators is weak, and human capital seems to be the first asset, somewhat than particular malware strains,” DomainTools mentioned. “Operators adapt to market circumstances, reorganize in response to takedowns, and belief relationships are important. These people will select to work with individuals they know, whatever the identify of the group.”

The Hacker News Tags:Broadens, CountLoader, Loader, Malware, MultiVersion, Operations, Ransomware, Russian

Post navigation

Previous Post: Tiffany Data Breach Impacts Thousands of Customers
Next Post: Palo Alto Networks Acknowledges SquareX Research on Limitations of SWGs Against Last Mile Reassembly Attacks

Related Posts

New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public The Hacker News
Can Your Security Stack See ChatGPT? Why Network Visibility Matters The Hacker News
U.K. Arrests Two Teen Scattered Spider Hackers Linked to August 2024 TfL Cyber Attack The Hacker News
Europol Disrupts NoName057(16) Hacktivist Group Linked to DDoS Attacks Against Ukraine The Hacker News
SAP S/4HANA Critical Vulnerability CVE-2025-42957 Exploited in the Wild The Hacker News
How to Automate CVE and Vulnerability Advisory Response with Tines The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Android Update Patches Critical Remote Code Execution Flaw
  • Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit
  • Weaponized Putty and Teams Ads Deliver Malware Allowing Hackers to Access Network
  • Microsoft Detects “SesameOp” Backdoor Using OpenAI’s API as a Stealth Command Channel
  • AMD Zen 5 Processors RDSEED Vulnerability Breaks Integrity With Randomness

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Android Update Patches Critical Remote Code Execution Flaw
  • Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit
  • Weaponized Putty and Teams Ads Deliver Malware Allowing Hackers to Access Network
  • Microsoft Detects “SesameOp” Backdoor Using OpenAI’s API as a Stealth Command Channel
  • AMD Zen 5 Processors RDSEED Vulnerability Breaks Integrity With Randomness

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News