Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Auraboros RAT Unveiled: Live Surveillance and Data Theft

Auraboros RAT Unveiled: Live Surveillance and Data Theft

Posted on April 22, 2026 By CWS

A newly discovered remote access trojan (RAT) framework, known as Auraboros, has emerged, presenting significant concerns due to its ability to access victim data and execute live monitoring without restrictions. This malware framework, dubbed Auraboros C2, is characterized by its open command-and-control (C2) panel, which lacks any form of authentication, thus allowing unrestricted access to sensitive data.

Unsecured Command-and-Control Dashboard

The Auraboros C2 panel operates on a DigitalOcean server using the IP address 174.138.43[.]25, running on port 5000 with an Express.js and Socket.io backend. The entire setup is exposed over plain HTTP, and its interface, designed in Brazilian Portuguese, displays a sophisticated appearance under the branding of ‘Auraboros Advanced Defense Systems.’ Despite its polished look, this system is devoid of any security measures to safeguard management operations or victim data.

Analysis by Breakglass Intelligence, prompted by alerts from security researchers @Fact_Finder03 and @4_n_0_n_1_3_3_7, revealed the framework’s comprehensive capabilities. The analysts discovered that the C2 panel’s 84KB JavaScript source code was accessible to any visitor, providing a full blueprint of the framework.

Comprehensive Threat Capabilities

The Auraboros framework is tailored for Windows systems and encompasses a wide range of capabilities, including screenshot capture, webcam snapshots, clipboard monitoring, and more. It features a live keylogging function with three-second intervals, Wi-Fi password extraction, and file browsing. Furthermore, it supports arbitrary shell command execution, ARP scanning, and OTA agent updates.

Among the six unauthenticated API endpoints, critical data such as beacon lists, command results, and event logs are exposed. The absence of session isolation in the Socket.io transport means that all command results are broadcast to every connected client.

Technical Details and Countermeasures

One notable technique employed by Auraboros involves DLL sideloading, where a benign executable, DiskIntegrityScanner.exe, serves as the host for a malicious DLL. This approach conceals the malware’s presence, complicating detection processes. The framework also targets browser credentials, specifically those stored in Brave and Chrome, by exploiting the Windows DPAPI to extract and decrypt stored passwords.

To mitigate risks associated with Auraboros, organizations should immediately block the IP address 174.138.43[.]25 and monitor endpoints for the presence of DiskIntegrityScanner.exe. Additionally, vigilance is advised for outbound connections to DigitalOcean-hosted IPs on port 9000 and reverse SOCKS5 proxy activity on port 1080. Reporting any suspicious infrastructure to DigitalOcean’s abuse team is also recommended.

For continuous updates on cybersecurity threats, follow us on Google News, LinkedIn, and X, and consider adding our site as a preferred source for cybersecurity news.

Cyber Security News Tags:Auraboros, cookie theft, Cybersecurity, data breach, DigitalOcean, DLL Sideloading, Keylogging, network security, RAT, remote access, threat intelligence

Post navigation

Previous Post: Claude Mythos AI Uncovers Numerous Firefox Vulnerabilities
Next Post: Supply Chain Worm Exploits npm to Steal Developer Tokens

Related Posts

Silent Watcher Attacking Windows Systems and Exfiltrate Data Using Discord Webhook Silent Watcher Attacking Windows Systems and Exfiltrate Data Using Discord Webhook Cyber Security News
Hackers Hijacking IIS Servers in The Wild Using Exposed ASP .NET Machine Keys to Inject Malicious Modules Hackers Hijacking IIS Servers in The Wild Using Exposed ASP .NET Machine Keys to Inject Malicious Modules Cyber Security News
Hackers Weaponizee Amazon Simple Email Service to Send 50,000+ Malicious Emails Per Day Hackers Weaponizee Amazon Simple Email Service to Send 50,000+ Malicious Emails Per Day Cyber Security News
Attacks on Palo Alto PAN-OS Global Protect Login Portals Surge from 2,200 IPs Attacks on Palo Alto PAN-OS Global Protect Login Portals Surge from 2,200 IPs Cyber Security News
Iranian Cyber Campaign Uses Multiple Hacker Personas Iranian Cyber Campaign Uses Multiple Hacker Personas Cyber Security News
New Stealthy Python Malware Leverages Discord to Steal Data From Windows Machines New Stealthy Python Malware Leverages Discord to Steal Data From Windows Machines Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Warning on Malicious KICS Docker Images and Extensions
  • Essential Phishing Defense Strategies for CISOs
  • Supply Chain Worm Exploits npm to Steal Developer Tokens
  • Auraboros RAT Unveiled: Live Surveillance and Data Theft
  • Claude Mythos AI Uncovers Numerous Firefox Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Warning on Malicious KICS Docker Images and Extensions
  • Essential Phishing Defense Strategies for CISOs
  • Supply Chain Worm Exploits npm to Steal Developer Tokens
  • Auraboros RAT Unveiled: Live Surveillance and Data Theft
  • Claude Mythos AI Uncovers Numerous Firefox Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark