Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
VOID#GEIST Malware Campaign Unveils Advanced RAT Delivery

VOID#GEIST Malware Campaign Unveils Advanced RAT Delivery

Posted on March 6, 2026 By CWS

In a recent disclosure, cybersecurity experts have detailed a sophisticated malware operation known as VOID#GEIST. This campaign employs batch scripts to deliver encrypted payloads of remote access trojans (RATs) such as XWorm, AsyncRAT, and Xeno RAT, marking a significant evolution in malware tactics.

Complex Attack Mechanism

VOID#GEIST employs a multi-layered strategy, starting with an obfuscated batch script. This script orchestrates the deployment of another batch script, establishes a legitimate embedded Python runtime, and decrypts shellcode, which is then injected into ‘explorer.exe’ using Early Bird Asynchronous Procedure Call (APC) injection. According to Securonix Threat Research, this approach mimics legitimate user activities, complicating detection.

The campaign shifts away from traditional executable files, opting instead for modular batch scripts and PowerShell commands. These methods enhance stealth and persistence, allowing operations to blend with regular administrative tasks. This fileless execution limits detection opportunities, enabling attackers to evade security systems effectively.

Initial Attack and Persistence

The attack begins with a batch script retrieved from a TryCloudflare domain, often distributed via phishing emails. This script capitalizes on the permissions of the current user without elevating privileges, ensuring the malware remains under the radar. It serves as a launchpad to display a decoy PDF using Google Chrome, distracting victims while executing malicious scripts in the background.

To maintain persistence, an auxiliary batch script is installed in the user’s Startup directory, running every time the system starts. This method avoids altering system-wide settings or creating noticeable alerts, thus reducing the risk of detection while maintaining a low forensic footprint.

Payload Deployment and Execution

Subsequent stages involve fetching additional payloads from TryCloudflare domains, delivered as ZIP files containing encrypted shellcode and decryption keys. The malware deploys a legitimate Python runtime, bypassing system dependencies and enhancing its stealth capabilities.

The primary objective is to execute the ‘runn.py’ script, which decrypts and activates the XWorm payload using the Early Bird APC injection method. The attack further utilizes ‘AppInstallerPythonRedirector.exe’ to launch Xeno RAT, while AsyncRAT is similarly deployed using scripted injections, maintaining its modular and adaptive architecture.

The operation concludes with a minimal HTTP beacon sent back to attacker-controlled infrastructure, confirming the breach. The identities of potential targets remain unknown, and the extent of successful infiltrations is yet to be determined.

Securonix highlights the modularity of this attack framework, where components are delivered in phases, enhancing both flexibility and resilience. The repeated process injections serve as behavioral indicators, offering clues to cybersecurity professionals for potential detection.

The Hacker News Tags:APC injection, AsyncRAT, Cybersecurity, fileless attack, Malware, Phishing, Python runtime, VOIDGEIST, Xeno RAT, XWorm

Post navigation

Previous Post: OpenAnt: AI Tool for Detecting Software Vulnerabilities
Next Post: Microsoft 365 North America Disruption Due to CDN Issue

Related Posts

Hackers Using New QuirkyLoader Malware to Spread Agent Tesla, AsyncRAT and Snake Keylogger Hackers Using New QuirkyLoader Malware to Spread Agent Tesla, AsyncRAT and Snake Keylogger The Hacker News
Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency The Hacker News
GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security The Hacker News
North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers The Hacker News
Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro The Hacker News
Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Advanced Linux Rootkits Exploit eBPF and io_uring
  • AI Model Identifies Significant Firefox Vulnerabilities
  • FBI Probes Breach in Wiretap and Surveillance Systems
  • RMM Tools: Vital for IT but Increasingly Misused by Hackers
  • New ClickFix Attacks Use Windows Terminal for Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Advanced Linux Rootkits Exploit eBPF and io_uring
  • AI Model Identifies Significant Firefox Vulnerabilities
  • FBI Probes Breach in Wiretap and Surveillance Systems
  • RMM Tools: Vital for IT but Increasingly Misused by Hackers
  • New ClickFix Attacks Use Windows Terminal for Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News