Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Matanbuchus 3.0 Emerges with Advanced Tactics to Deliver AstarionRAT

Matanbuchus 3.0 Emerges with Advanced Tactics to Deliver AstarionRAT

Posted on February 18, 2026 By CWS

Matanbuchus 3.0 has reentered the cybersecurity landscape in February 2026 after a lengthy absence. This latest version, fully rewritten, now commands a steep subscription fee of $15,000 monthly, indicating a shift towards high-value, targeted operations rather than broad spam campaigns.

ClickFix Social Engineering

The malware employs the ‘ClickFix’ social engineering tactic, misleading users into executing harmful commands by presenting them as solutions to fictitious browser errors or software updates. This approach circumvents traditional security measures by exploiting trust rather than software vulnerabilities.

Victims receive deceptive prompts urging them to copy and paste specific commands into PowerShell or Run dialogs. The URLs used confuse logging systems with backslashes and path traversal sequences. As the user initiates the process, many standard defenses are bypassed, leading to a silent installation without any visible interface.

AstarionRAT Delivery

Security analysts at Huntress have identified that Matanbuchus 3.0’s campaign delivers a novel payload known as AstarionRAT post-infection. This remote access trojan boasts 24 commands, including credential theft and SOCKS5 proxying, allowing operators to quickly move laterally within networks to target domain controllers, often with the intent of deploying ransomware or stealing data.

The infection mechanism is sophisticated, beginning with a mixed-case msiexec command fetching a payload from a newly registered domain. A legitimate yet vulnerable antivirus binary is then deployed alongside a malicious DLL in directories mimicking reputable vendors, further complicating detection.

Evading Detection

To obscure its actions, the malware uses a renamed version of 7-Zip to extract password-protected archives containing subsequent components. The malicious DLL, side-loaded by the antivirus engine, decrypts the Matanbuchus loader, launching an embedded Lua interpreter that executes the final AstarionRAT payload directly into memory, minimizing forensic traces.

Security teams are advised to configure endpoint detection systems to flag msiexec commands with mixed-case characters or suspect URLs. Monitoring for unusual directories in %APPDATA% and verifying connections to recently registered domains is crucial. Employee training to avoid pasting raw commands into terminals is also essential.

For more updates on cybersecurity threats and defenses, follow us on Google News, LinkedIn, and X, and set CSN as a preferred news source on Google.

Cyber Security News Tags:AstarionRAT, ClickFix, cyber attack, Cybersecurity, Malware, malware-as-a-service, Matanbuchus, remote access trojan, security threat, silent installation, social engineering

Post navigation

Previous Post: Dell Vulnerability Exploited by Chinese Hackers Since 2024
Next Post: Critical Flaw in Windows Admin Center Enables Privilege Escalation

Related Posts

Quttera Launches “Evidence-as-Code” API to Automate Security Compliance for SOC 2 and PCI DSS v4.0 Quttera Launches “Evidence-as-Code” API to Automate Security Compliance for SOC 2 and PCI DSS v4.0 Cyber Security News
Kali Linux 2025.4 Released With 3 New Hacking Tools and Wifipumpkin3 Kali Linux 2025.4 Released With 3 New Hacking Tools and Wifipumpkin3 Cyber Security News
Chrome Security Update Patches Background Fetch API Vulnerability Chrome Security Update Patches Background Fetch API Vulnerability Cyber Security News
LangGraph Vulnerability Allows Malicious Python Code Execution During Deserialization LangGraph Vulnerability Allows Malicious Python Code Execution During Deserialization Cyber Security News
Criminal IP to Showcase ASM and CTI Innovations at GovWare 2025 in Singapore Criminal IP to Showcase ASM and CTI Innovations at GovWare 2025 in Singapore Cyber Security News
Cisco Hacked – Attackers Stolen Profile Details of users Registered on Cisco.com Cisco Hacked – Attackers Stolen Profile Details of users Registered on Cisco.com Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CRESCENTHARVEST Malware Targets Iran Protesters
  • Dell RecoverPoint Exploited by Chinese Hackers
  • CISA Highlights Four Actively Exploited Security Vulnerabilities
  • Critical Flaw in Windows Admin Center Enables Privilege Escalation
  • Matanbuchus 3.0 Emerges with Advanced Tactics to Deliver AstarionRAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CRESCENTHARVEST Malware Targets Iran Protesters
  • Dell RecoverPoint Exploited by Chinese Hackers
  • CISA Highlights Four Actively Exploited Security Vulnerabilities
  • Critical Flaw in Windows Admin Center Enables Privilege Escalation
  • Matanbuchus 3.0 Emerges with Advanced Tactics to Deliver AstarionRAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News