Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Arcane Werewolf Hacker Group Added Loki 2.1 Malware Toolkit to their Arsenal

Arcane Werewolf Hacker Group Added Loki 2.1 Malware Toolkit to their Arsenal

Posted on December 22, 2025December 22, 2025 By CWS

The menace actor group often called Arcane Werewolf, additionally tracked as Mythic Likho, has refreshed its assault capabilities by deploying a brand new model of its customized malware referred to as Loki 2.1.

Throughout October and November 2025, researchers noticed this group launching campaigns particularly concentrating on Russian manufacturing corporations.

The group continues to refine its techniques, exhibiting a sustained curiosity within the manufacturing sector and demonstrating energetic improvement of its malware toolkit.

This newest model of Loki represents a big improve, because it now works with each the Mythic and Havoc post-exploitation frameworks, making it extra versatile and harmful within the fingers of skilled attackers.

The malware spreads by fastidiously crafted phishing emails that seem to come back from reliable manufacturing corporations.

Victims obtain messages containing hyperlinks that result in spoofed web sites imitating actual organizations. When clicked, these hyperlinks ship ZIP archives hosted on the attackers’ command and management servers.

This method works as a result of persons are extra more likely to belief emails after they appear to come back from acknowledged manufacturers and organizations. As soon as the sufferer downloads and opens the archive, the an infection chain begins.

Exfiltrated knowledge (Supply – Bi.Zone)

Bi.Zone analysts recognized the malware after monitoring the distribution technique and analyzing the an infection course of.

The assault begins when a sufferer opens a malicious shortcut file, or LNK file, hidden contained in the ZIP archive.

This file triggers a command that makes use of PowerShell to obtain an executable disguised as a picture file from the attacker’s server.

The downloaded file is definitely a dropper written within the Go programming language, which carries encoded payloads hidden inside it.

The Loki 2.1 An infection Mechanism

The Go dropper comprises two separate payloads that it decodes and executes in sequence. First, it drops a malicious loader referred to as chrome_proxy.pdf, which is accountable for speaking with the attacker’s command and management server.

The malicious loader gathers system info from the contaminated laptop, together with the pc title, working system model, inner IP addresses, and username.

Decoy contents (Supply – Bi.Zone)

This stolen knowledge is encrypted utilizing the AES encryption algorithm and despatched again to the attackers over HTTPS connections.

The loader then waits for instructions from the attackers, able to inject malicious code into working processes, add recordsdata to the sufferer’s system, or exfiltrate delicate knowledge.

Moreover, the loader can terminate particular processes on the contaminated laptop, giving attackers vital management over the system’s operation and permitting them to take away safety instruments or different software program that may intervene with their actions.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Added, Arcane, Arsenal, Group, Hacker, Loki, Malware, Toolkit, Werewolf

Post navigation

Previous Post: MacSync macOS Malware Distributed via Signed Swift Application
Next Post: Docker Open Sources Production-Ready Hardened Images for Free

Related Posts

DrayOS Routers Vulnerability Let Attackers Execute Malicious Code Remotely DrayOS Routers Vulnerability Let Attackers Execute Malicious Code Remotely Cyber Security News
Reclaim Security Secures M for Cybersecurity Innovation Reclaim Security Secures $26M for Cybersecurity Innovation Cyber Security News
Fortinet Patches Critical Vulnerabilities in Key Products Fortinet Patches Critical Vulnerabilities in Key Products Cyber Security News
OpenAI Unveils Codex Security for Software Vulnerabilities OpenAI Unveils Codex Security for Software Vulnerabilities Cyber Security News
IBM AIX Vulnerabilities Let Remote Attacker Execute Arbitrary Commands IBM AIX Vulnerabilities Let Remote Attacker Execute Arbitrary Commands Cyber Security News
Google Warns of Chrome 0-Day Vulnerability Actively Exploited in the wild Google Warns of Chrome 0-Day Vulnerability Actively Exploited in the wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark