Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
VOID#GEIST Malware Campaign Unveils Advanced RAT Delivery

VOID#GEIST Malware Campaign Unveils Advanced RAT Delivery

Posted on March 6, 2026 By CWS

In a recent disclosure, cybersecurity experts have detailed a sophisticated malware operation known as VOID#GEIST. This campaign employs batch scripts to deliver encrypted payloads of remote access trojans (RATs) such as XWorm, AsyncRAT, and Xeno RAT, marking a significant evolution in malware tactics.

Complex Attack Mechanism

VOID#GEIST employs a multi-layered strategy, starting with an obfuscated batch script. This script orchestrates the deployment of another batch script, establishes a legitimate embedded Python runtime, and decrypts shellcode, which is then injected into ‘explorer.exe’ using Early Bird Asynchronous Procedure Call (APC) injection. According to Securonix Threat Research, this approach mimics legitimate user activities, complicating detection.

The campaign shifts away from traditional executable files, opting instead for modular batch scripts and PowerShell commands. These methods enhance stealth and persistence, allowing operations to blend with regular administrative tasks. This fileless execution limits detection opportunities, enabling attackers to evade security systems effectively.

Initial Attack and Persistence

The attack begins with a batch script retrieved from a TryCloudflare domain, often distributed via phishing emails. This script capitalizes on the permissions of the current user without elevating privileges, ensuring the malware remains under the radar. It serves as a launchpad to display a decoy PDF using Google Chrome, distracting victims while executing malicious scripts in the background.

To maintain persistence, an auxiliary batch script is installed in the user’s Startup directory, running every time the system starts. This method avoids altering system-wide settings or creating noticeable alerts, thus reducing the risk of detection while maintaining a low forensic footprint.

Payload Deployment and Execution

Subsequent stages involve fetching additional payloads from TryCloudflare domains, delivered as ZIP files containing encrypted shellcode and decryption keys. The malware deploys a legitimate Python runtime, bypassing system dependencies and enhancing its stealth capabilities.

The primary objective is to execute the ‘runn.py’ script, which decrypts and activates the XWorm payload using the Early Bird APC injection method. The attack further utilizes ‘AppInstallerPythonRedirector.exe’ to launch Xeno RAT, while AsyncRAT is similarly deployed using scripted injections, maintaining its modular and adaptive architecture.

The operation concludes with a minimal HTTP beacon sent back to attacker-controlled infrastructure, confirming the breach. The identities of potential targets remain unknown, and the extent of successful infiltrations is yet to be determined.

Securonix highlights the modularity of this attack framework, where components are delivered in phases, enhancing both flexibility and resilience. The repeated process injections serve as behavioral indicators, offering clues to cybersecurity professionals for potential detection.

The Hacker News Tags:APC injection, AsyncRAT, Cybersecurity, fileless attack, Malware, Phishing, Python runtime, VOIDGEIST, Xeno RAT, XWorm

Post navigation

Previous Post: OpenAnt: AI Tool for Detecting Software Vulnerabilities
Next Post: Microsoft 365 North America Disruption Due to CDN Issue

Related Posts

Silver Fox APT Targets Taiwan with Complex Gh0stCringe and HoldingHands RAT Malware Silver Fox APT Targets Taiwan with Complex Gh0stCringe and HoldingHands RAT Malware The Hacker News
Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers The Hacker News
Critical Cisco Flaws Fixed: IMC and SSM Security Updates Critical Cisco Flaws Fixed: IMC and SSM Security Updates The Hacker News
Focusing Security Where Business Value Lives Focusing Security Where Business Value Lives The Hacker News
APT28 Exploits MSHTML Vulnerability Before February 2026 Patch APT28 Exploits MSHTML Vulnerability Before February 2026 Patch The Hacker News
Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Highlights Critical Vulnerabilities in Cisco and Kentico
  • Understanding Identity-Based Cyber Attacks and Defense
  • North Korean Group Implicated in $290M Kelp DAO Crypto Theft
  • SideWinder Targets Government Emails with Fake PDF Viewer
  • GitHub AI Agents Exposed to New Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Highlights Critical Vulnerabilities in Cisco and Kentico
  • Understanding Identity-Based Cyber Attacks and Defense
  • North Korean Group Implicated in $290M Kelp DAO Crypto Theft
  • SideWinder Targets Government Emails with Fake PDF Viewer
  • GitHub AI Agents Exposed to New Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark