Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Matanbuchus 3.0 Emerges with Advanced Tactics to Deliver AstarionRAT

Matanbuchus 3.0 Emerges with Advanced Tactics to Deliver AstarionRAT

Posted on February 18, 2026 By CWS

Matanbuchus 3.0 has reentered the cybersecurity landscape in February 2026 after a lengthy absence. This latest version, fully rewritten, now commands a steep subscription fee of $15,000 monthly, indicating a shift towards high-value, targeted operations rather than broad spam campaigns.

ClickFix Social Engineering

The malware employs the ‘ClickFix’ social engineering tactic, misleading users into executing harmful commands by presenting them as solutions to fictitious browser errors or software updates. This approach circumvents traditional security measures by exploiting trust rather than software vulnerabilities.

Victims receive deceptive prompts urging them to copy and paste specific commands into PowerShell or Run dialogs. The URLs used confuse logging systems with backslashes and path traversal sequences. As the user initiates the process, many standard defenses are bypassed, leading to a silent installation without any visible interface.

AstarionRAT Delivery

Security analysts at Huntress have identified that Matanbuchus 3.0’s campaign delivers a novel payload known as AstarionRAT post-infection. This remote access trojan boasts 24 commands, including credential theft and SOCKS5 proxying, allowing operators to quickly move laterally within networks to target domain controllers, often with the intent of deploying ransomware or stealing data.

The infection mechanism is sophisticated, beginning with a mixed-case msiexec command fetching a payload from a newly registered domain. A legitimate yet vulnerable antivirus binary is then deployed alongside a malicious DLL in directories mimicking reputable vendors, further complicating detection.

Evading Detection

To obscure its actions, the malware uses a renamed version of 7-Zip to extract password-protected archives containing subsequent components. The malicious DLL, side-loaded by the antivirus engine, decrypts the Matanbuchus loader, launching an embedded Lua interpreter that executes the final AstarionRAT payload directly into memory, minimizing forensic traces.

Security teams are advised to configure endpoint detection systems to flag msiexec commands with mixed-case characters or suspect URLs. Monitoring for unusual directories in %APPDATA% and verifying connections to recently registered domains is crucial. Employee training to avoid pasting raw commands into terminals is also essential.

For more updates on cybersecurity threats and defenses, follow us on Google News, LinkedIn, and X, and set CSN as a preferred news source on Google.

Cyber Security News Tags:AstarionRAT, ClickFix, cyber attack, Cybersecurity, Malware, malware-as-a-service, Matanbuchus, remote access trojan, security threat, silent installation, social engineering

Post navigation

Previous Post: Dell Vulnerability Exploited by Chinese Hackers Since 2024
Next Post: Critical Flaw in Windows Admin Center Enables Privilege Escalation

Related Posts

Kea DHCP Server Vulnerability Let Remote Attacker Crash With a Single Crafted Packet Kea DHCP Server Vulnerability Let Remote Attacker Crash With a Single Crafted Packet Cyber Security News
Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks Cyber Security News
Hackers Exploit DNS Queries for C2 Operations and Data Exfiltration, Bypassing Traditional Defenses Hackers Exploit DNS Queries for C2 Operations and Data Exfiltration, Bypassing Traditional Defenses Cyber Security News
Zero-Click Microsoft 365 Copilot Vulnerability Let Attackers Exfiltrates Sensitive Data Abusing Teams Zero-Click Microsoft 365 Copilot Vulnerability Let Attackers Exfiltrates Sensitive Data Abusing Teams Cyber Security News
Zoom Vulnerabilities Let Attackers Bypass Access Controls to Access Session Data Zoom Vulnerabilities Let Attackers Bypass Access Controls to Access Session Data Cyber Security News
DragonForce Ransomware Claimed To Compromise Over 120 Victims in The Past Year DragonForce Ransomware Claimed To Compromise Over 120 Victims in The Past Year Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Exploit Code Leak to Spread Malware via GitHub
  • Fortinet Issues Patch for Critical FortiClient EMS Vulnerability
  • Progress ShareFile Flaws Risk Server Takeover
  • European Commission Data Breach from Trivy Attack Unveiled
  • Top VPNs for Chrome in 2026: Secure Your Browsing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Exploit Code Leak to Spread Malware via GitHub
  • Fortinet Issues Patch for Critical FortiClient EMS Vulnerability
  • Progress ShareFile Flaws Risk Server Takeover
  • European Commission Data Breach from Trivy Attack Unveiled
  • Top VPNs for Chrome in 2026: Secure Your Browsing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark