Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Salat Malware: Stealthy Control via QUIC and WebSocket

Salat Malware: Stealthy Control via QUIC and WebSocket

Posted on May 7, 2026 By CWS

A newly emerged threat in the cybersecurity landscape, known as Salat malware, is causing significant concern due to its advanced capabilities and stealthy operations. Developed using the Go programming language, this malware functions as a full-fledged remote access trojan, allowing attackers to maintain extensive and persistent control over compromised systems.

Salat’s versatility sets it apart from simpler malware, as it can execute a wide array of tasks, ranging from password theft to providing real-time access to a victim’s screen and webcam. The malware’s ability to communicate with its controllers using modern protocols like QUIC and WebSocket makes it particularly challenging for security tools to detect, as it seamlessly integrates its traffic with regular internet activities.

Stealthy Communication Techniques

Salat distinguishes itself by employing cutting-edge communication methods to remain undetected. By utilizing QUIC and WebSocket protocols, the malware cleverly disguises its traffic, blending into normal network activities. This approach significantly complicates the task of identifying suspicious behavior, as these protocols are common in legitimate web services.

Researchers from DarkAtlas, who conducted a thorough analysis of Salat, released their findings on May 6, 2026. They highlighted the malware’s sophisticated design, which includes six methods for concealing internal strings and generating a unique identity for each infected machine. This level of sophistication underscores the professional planning behind Salat’s development.

Data Gathering and Persistence

Upon infiltration, Salat promptly begins gathering detailed information about the infected system, including operating system specifics, hardware configurations, and active applications. This information is encrypted and transmitted to the attacker’s server, providing them with a comprehensive understanding of the compromised machine.

The malware’s data theft capabilities are extensive, targeting browsers, cryptocurrency wallets, messaging apps, and clipboard contents. By capturing keystrokes, taking screenshots, and enabling a remote shell for command execution, Salat effectively grants full control of the infected device to its operators.

Robust Persistence Mechanisms

Salat ensures its continued presence on an infected system through multiple persistence strategies. It disguises itself with names resembling legitimate Windows processes, such as explorer.exe, and creates scheduled tasks to maintain activity. Additionally, it modifies registry keys to automatically launch upon system startup.

In case its command servers become unreachable, Salat ingeniously uses the TON blockchain to obtain new server addresses via Cloudflare’s encrypted DNS. This tactic makes it nearly impossible to completely disrupt its operation, as the blockchain remains online regardless of individual server outages.

Security experts advise monitoring for unusual outbound connections using QUIC or WebSocket protocols and inspecting hidden system files with suspicious names. Keeping endpoint security tools updated to detect Go-based malware and auditing scheduled tasks can significantly mitigate the risk of Salat infections.

Conclusion

The emergence of Salat malware highlights the evolving complexity and sophistication of cyber threats. Its use of modern protocols and robust persistence mechanisms poses significant challenges for cybersecurity professionals. Vigilant monitoring and proactive security measures are crucial to protecting systems from such advanced threats.

Cyber Security News Tags:Blockchain, C2 servers, cyber threats, Cybersecurity, DarkAtlas research, data theft, endpoint security, Go programming language, malware persistence, QUIC protocol, remote access trojan, Salat malware, stealth malware, TON network, WebSocket

Post navigation

Previous Post: Phishing Campaign Targets Users with Fake Event Invites

Related Posts

CISA Releases Two Advisories Covering Vulnerabilities, and Exploits Surrounding ICS CISA Releases Two Advisories Covering Vulnerabilities, and Exploits Surrounding ICS Cyber Security News
DIG AI – Darknet AI Tool Enabling Threat Actors to Launch Sophisticated Attacks DIG AI – Darknet AI Tool Enabling Threat Actors to Launch Sophisticated Attacks Cyber Security News
Fortinet FortiWeb Instances Hacked with Webshells Following Public PoC Exploits Fortinet FortiWeb Instances Hacked with Webshells Following Public PoC Exploits Cyber Security News
Critical Apache bRPC Framework Vulnerability Let Attackers Crash the Server Critical Apache bRPC Framework Vulnerability Let Attackers Crash the Server Cyber Security News
Upcoming DMARC Enhancements Discussed by Email Experts Upcoming DMARC Enhancements Discussed by Email Experts Cyber Security News
Lighthouse Studio RCE Vulnerability Let Attackers Gain Access to Hosting Servers Lighthouse Studio RCE Vulnerability Let Attackers Gain Access to Hosting Servers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Salat Malware: Stealthy Control via QUIC and WebSocket
  • Phishing Campaign Targets Users with Fake Event Invites
  • Spotting Phishing-to-RMM Threats Early
  • Critical MajorDoMo Vulnerability Enables Remote Code Execution
  • Taiwan Rail Network Disrupted by Radio Signal Spoofing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Salat Malware: Stealthy Control via QUIC and WebSocket
  • Phishing Campaign Targets Users with Fake Event Invites
  • Spotting Phishing-to-RMM Threats Early
  • Critical MajorDoMo Vulnerability Enables Remote Code Execution
  • Taiwan Rail Network Disrupted by Radio Signal Spoofing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark