Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Arcane Werewolf Hacker Group Added Loki 2.1 Malware Toolkit to their Arsenal

Arcane Werewolf Hacker Group Added Loki 2.1 Malware Toolkit to their Arsenal

Posted on December 22, 2025December 22, 2025 By CWS

The menace actor group often called Arcane Werewolf, additionally tracked as Mythic Likho, has refreshed its assault capabilities by deploying a brand new model of its customized malware referred to as Loki 2.1.

Throughout October and November 2025, researchers noticed this group launching campaigns particularly concentrating on Russian manufacturing corporations.

The group continues to refine its techniques, exhibiting a sustained curiosity within the manufacturing sector and demonstrating energetic improvement of its malware toolkit.

This newest model of Loki represents a big improve, because it now works with each the Mythic and Havoc post-exploitation frameworks, making it extra versatile and harmful within the fingers of skilled attackers.

The malware spreads by fastidiously crafted phishing emails that seem to come back from reliable manufacturing corporations.

Victims obtain messages containing hyperlinks that result in spoofed web sites imitating actual organizations. When clicked, these hyperlinks ship ZIP archives hosted on the attackers’ command and management servers.

This method works as a result of persons are extra more likely to belief emails after they appear to come back from acknowledged manufacturers and organizations. As soon as the sufferer downloads and opens the archive, the an infection chain begins.

Exfiltrated knowledge (Supply – Bi.Zone)

Bi.Zone analysts recognized the malware after monitoring the distribution technique and analyzing the an infection course of.

The assault begins when a sufferer opens a malicious shortcut file, or LNK file, hidden contained in the ZIP archive.

This file triggers a command that makes use of PowerShell to obtain an executable disguised as a picture file from the attacker’s server.

The downloaded file is definitely a dropper written within the Go programming language, which carries encoded payloads hidden inside it.

The Loki 2.1 An infection Mechanism

The Go dropper comprises two separate payloads that it decodes and executes in sequence. First, it drops a malicious loader referred to as chrome_proxy.pdf, which is accountable for speaking with the attacker’s command and management server.

The malicious loader gathers system info from the contaminated laptop, together with the pc title, working system model, inner IP addresses, and username.

Decoy contents (Supply – Bi.Zone)

This stolen knowledge is encrypted utilizing the AES encryption algorithm and despatched again to the attackers over HTTPS connections.

The loader then waits for instructions from the attackers, able to inject malicious code into working processes, add recordsdata to the sufferer’s system, or exfiltrate delicate knowledge.

Moreover, the loader can terminate particular processes on the contaminated laptop, giving attackers vital management over the system’s operation and permitting them to take away safety instruments or different software program that may intervene with their actions.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Added, Arcane, Arsenal, Group, Hacker, Loki, Malware, Toolkit, Werewolf

Post navigation

Previous Post: MacSync macOS Malware Distributed via Signed Swift Application
Next Post: Docker Open Sources Production-Ready Hardened Images for Free

Related Posts

Windows 11 Gets New AI-Powered Features Windows 11 Gets New AI-Powered Features Cyber Security News
Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data Cyber Security News
12 Best Infrastructure Monitoring Tools in 2025 12 Best Infrastructure Monitoring Tools in 2025 Cyber Security News
Washington Post Journalists’ Microsoft Accounts Hacked in Targetetd Cyberattack Washington Post Journalists’ Microsoft Accounts Hacked in Targetetd Cyberattack Cyber Security News
Threat Actors Use Sophisticated Hacking Tools to Destroy Organizations Critical Infrastructure Threat Actors Use Sophisticated Hacking Tools to Destroy Organizations Critical Infrastructure Cyber Security News
Google Requires Crypto App Developers to Have License or Certification From Relevant Authorities Google Requires Crypto App Developers to Have License or Certification From Relevant Authorities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News