Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
DarkCloud Stealer Attacking Financial Companies With Weaponized RAR Attachments

DarkCloud Stealer Attacking Financial Companies With Weaponized RAR Attachments

Posted on September 15, 2025September 15, 2025 By CWS

DarkCloud Stealer has just lately emerged as a potent risk concentrating on monetary organizations via convincing phishing campaigns. Adversaries make use of weaponized RAR attachments masquerading as legit paperwork to ship a multi-stage JavaScript-based payload.

Upon opening the archive, victims execute a VBE script that leverages Home windows Script Host to provoke a PowerShell downloader hidden in innocuous-seeming picture information.

This preliminary entry vector exploits customers’ belief in routine monetary correspondence, triggering an automatic chain of decoding and decryption steps designed to evade typical safety controls.

In early September 2025, safety groups noticed a dramatic uptick in malicious RAR attachments despatched to company electronic mail accounts inside the banking sector.

CyberProof analysts recognized that the archive named “Proof of Cost.rar” accommodates a VBE script which, when executed, calls PowerShell to obtain an embedded JPG file named universe-1733359315202-8750.jpg.

Machine timeline exhibiting the obtain activty from person (Supply – CyberProof)

The stealer’s loader is hid inside this picture, and the decoding routine extracts the .NET DLL module instantly from picture pixel knowledge.

CyberProof researchers famous that the PowerShell script rigorously checks reminiscence offsets to find a definite BMP header sample earlier than carving out the loader DLL.

The next snippet illustrates the core loop used for scanning the downloaded picture bytes:-

for ($i=0; $i -lt $knowledge.Size – $header. Size; $i++) {
$match = $true
for ($j=0; $j -lt $header.Size; $j++) {
if ($knowledge[$i + $j] -ne $header[$j]) { $match = $false; break }
}
if ($match) { $offset = $i; break }
}

As soon as the DLL is reconstructed in reminiscence, the script invokes [Reflection.Assembly]::Load() to execute the loader with out ever touching disk.

Persistence and Credential Theft

After loading into reminiscence, DarkCloud Stealer establishes persistence by copying a JavaScript payload to the Home windows Run registry key below a disguised filename (M3hd0pf.exe masquerading as MSBuild.exe), guaranteeing execution on each person login.

The stealer then injects into legit processes like MSBuild.exe and mtstocom.exe utilizing course of hollowing methods, enabling it to siphon saved credentials from browser databases akin to Chrome’s Login Information.

Alerts from endpoint detection platforms verify DPAPI entry occasions and reminiscence mapping into browser processes, revealing makes an attempt to decrypt saved passwords instantly in reminiscence.

Stolen knowledge being despatched to distant IPs (Supply – CyberProof)

Lastly, stolen knowledge is staged in person directories and exfiltrated by way of FTP and HTTP channels to dynamic area clusters (.store, .xyz), complicating network-based detection.

Monetary establishments are urged to watch for anomalous VBE/VBS execution, sudden registry Run key modifications, and JavaScript information in public obtain folders to quickly detect and disrupt this insidious marketing campaign.

Enhance your SOC and assist your workforce shield your online business with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attachments, Attacking, Companies, DarkCloud, Financial, RAR, Stealer, Weaponized

Post navigation

Previous Post: Samsung Patches Zero-Day Exploited Against Android Users
Next Post: Great Firewall of China’s Sensitive Data of Over 500GB+ Leaked Online

Related Posts

ErrTraffic Fueling ClickFix by Breaking the Page Visually and Turns Attack to GlitchFix ErrTraffic Fueling ClickFix by Breaking the Page Visually and Turns Attack to GlitchFix Cyber Security News
Critical GoAnywhere MFT Platform Vulnerability Exposes Enterprises to Remote Exploitation Critical GoAnywhere MFT Platform Vulnerability Exposes Enterprises to Remote Exploitation Cyber Security News
Chinese Hackers Attacking Windows Systems in Targeted Campaign to Deploy Ghost RAT and PhantomNet Malwares Chinese Hackers Attacking Windows Systems in Targeted Campaign to Deploy Ghost RAT and PhantomNet Malwares Cyber Security News
Microsoft Defender for Office 365 to Block Email Bombing Attacks Microsoft Defender for Office 365 to Block Email Bombing Attacks Cyber Security News
Critical Western Digital My Cloud NAS Vulnerability Allows Remote Code Execution Critical Western Digital My Cloud NAS Vulnerability Allows Remote Code Execution Cyber Security News
Mustang Panda With SnakeDisk USB Worm and Toneshell Backdoor Seeking to Penetrate Air-Gap Systems Mustang Panda With SnakeDisk USB Worm and Toneshell Backdoor Seeking to Penetrate Air-Gap Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News