Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Trojanized Gaming Tools Spread Java RAT via Online Platforms

Trojanized Gaming Tools Spread Java RAT via Online Platforms

Posted on February 27, 2026 By CWS

Cybersecurity experts have uncovered a disturbing trend where malicious actors are exploiting gaming utilities to propagate a sophisticated remote access trojan (RAT). This campaign involves trojanized gaming tools distributed through browsers and chat applications, aiming to compromise user security.

Methods of Distribution and Execution

According to a report by the Microsoft Threat Intelligence team, attackers employ a deceptive downloader that sets up a portable Java runtime environment and executes a harmful Java archive (JAR) file named jd-gui.jar. This downloader cleverly utilizes PowerShell scripts and living-off-the-land binaries (LOLBins) like cmstp.exe to conduct operations stealthily and avoid detection.

The attackers further obfuscate their activities by removing initial download traces and configuring Microsoft Defender exclusions for the RAT’s components. Persistence is maintained through scheduled tasks and a Windows startup script named “world.vbs,” ensuring the RAT remains active until the final payload is delivered to the compromised system.

Threat Analysis and Defense Strategies

Once installed, the RAT establishes a connection with an external command-and-control server at “79.110.49[.]15,” enabling the exfiltration of sensitive data and the download of additional malicious payloads. To counter this threat, users should audit Microsoft Defender exclusions and scheduled tasks, eliminate malicious scripts, isolate impacted endpoints, and reset credentials for affected users.

Further complicating the cybersecurity landscape, BlackFog has revealed a new Windows RAT malware family known as Steaelite, which emerged on the dark web in November 2025. Marketed as a “fully undetectable” tool, Steaelite integrates data theft and ransomware functionalities into a single interface, with an Android ransomware module under development.

Advanced Capabilities of Emerging RATs

Steaelite offers a comprehensive suite of features, including remote code execution, file management, live surveillance, and credential theft. It enables operators to control compromised Windows machines via a web-based dashboard, facilitating a range of malicious activities from file exfiltration to ransomware deployment.

Security researchers have also identified two additional RAT families, DesckVB RAT and KazakRAT, which allow extensive remote manipulation of infected hosts. Notably, KazakRAT is believed to be linked to a state-sponsored group targeting entities in Kazakhstan and Afghanistan, highlighting the global scale and political dimensions of these cyber threats.

With the rise of these sophisticated RATs, organizations must remain vigilant and invest in robust cybersecurity measures to protect their digital assets from evolving threats.

The Hacker News Tags:Cybersecurity, data theft, endpoint security, gaming tools, Java RAT, Malware, Microsoft Defender, Ransomware, remote access trojan, Steaelite RAT, Windows security

Post navigation

Previous Post: Critical Juniper Networks Flaw Risks PTX Series Routers
Next Post: Microsoft Defender Expands Security to Teams with URL Alerts

Related Posts

Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft The Hacker News
Hard-Coded ‘b’ Password in Sitecore XP Sparks Major RCE Risk in Enterprise Deployments Hard-Coded ‘b’ Password in Sitecore XP Sparks Major RCE Risk in Enterprise Deployments The Hacker News
China-Based APTs Deploy Fake Dalai Lama Apps to Spy on Tibetan Community China-Based APTs Deploy Fake Dalai Lama Apps to Spy on Tibetan Community The Hacker News
Navigating Cybersecurity Amidst Constant Instability Navigating Cybersecurity Amidst Constant Instability The Hacker News
Securing Data in the AI Era Securing Data in the AI Era The Hacker News
Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Trump Directs Federal Agencies to Cease Anthropic Technology
  • Aeternum C2: Unstoppable Botnet Leveraging Blockchain
  • DoJ Seizes Tether in Major Crypto Scam Crackdown
  • Dohdoor Malware Targets U.S. Schools and Healthcare
  • Over 900 FreePBX Systems Infected in Web Shell Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Trump Directs Federal Agencies to Cease Anthropic Technology
  • Aeternum C2: Unstoppable Botnet Leveraging Blockchain
  • DoJ Seizes Tether in Major Crypto Scam Crackdown
  • Dohdoor Malware Targets U.S. Schools and Healthcare
  • Over 900 FreePBX Systems Infected in Web Shell Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News