Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

US Army announces contract worth up to $20 billion with Anduril

Honda will discontinue EVs and have no chance of competing in the future.

Flaw in OpenClaw AI agent could allow rapid injection and data leakage

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Encrypthub exploits Windows Zero-day to deploy Rhadamanthys and StealC malware
Identity

Encrypthub exploits Windows Zero-day to deploy Rhadamanthys and StealC malware

By March 26, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 26, 2025Ravi LakshmananWindows Security/Vulnerabilities

Windows Zero-day

A threat actor known as Encrypthub has leveraged recently patched security vulnerabilities in Microsoft Windows as zero-days, offering a wide range of malware families, including backdoors and information steels such as Rhadamanthys and Stealc.

“In this attack, threat actors manipulate .MSC files and multilingual user interface paths (MUIPATH) to download and run malicious payloads, maintain persistence from infected systems and steal susceptibility data.”

The vulnerability in question is CVE-2025-26633 (CVSS score: 7.0), which Microsoft describes as an inappropriate neutralization vulnerability in the Microsoft Management Console (MMC), allowing attackers to bypass security features locally. It was revised earlier this month by the company as part of Tuesday’s update.

Cybersecurity

Trend Micro exploited MSC Eviltwin by tracking down a suspected Russian activity cluster under the name Water Gamayun. Threat Actors, the threat that has recently been analysed by Prodaft and Outpost24, is also known as larva-208.

CVE-2025-26633 leverages the Microsoft Management Console Framework (MMC) to run malicious Microsoft Console (.MSC) files using a PowerShell loader called the MSC Eviltwin Loader.

Specifically, it contains a loader that creates two .MSC files with the same name. One clean file will be dropped in the same location and in a directory named “En-US”. The idea is that when the former is executed, MMC inadvertently selects and executes malicious files instead. This is achieved by leveraging MMC’s Multilingual User Interface Path (MUIPATH) feature.

Windows Zero-day

“By abusing the way MMC.exe uses Muipath, attackers can equip Muipath En-US with malicious .MSC files.

It has also been observed that Encrypthub uses two other methods to perform malicious payloads on infected systems using .msc files –

Use the executeShellCommand method in MMC to download and run the following step-by-step payload on the victim’s machine: This is a “note post-Windows space” that was previously documented by a Dutch cybersecurity company in August 2024 to bypass and drop user account controls using mock trusted directories such as “C:\Windows\System32”.

Cybersecurity

Trend Micro said the attack chain would likely start with victims downloading Microsoft Installer (MSI) files digitally signed to legitimate Chinese software such as DingTalk and QQTalk. The threat actor is said to have been experimenting with these techniques since April 2024.

“The campaign is actively developed. It employs multiple delivery methods and custom payloads designed to maintain persistence, steal sensitive data and extract it to attacker command and control (C&C) servers,” Zahravi said.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleRedCurl moves from spy to ransomware with the first ever QWCRYPT deployment
Next Article Elon Musk’s Grok Ai has landed on Telegram and has access to over 1 billion users. A new era of search and chat

Related Posts

Flaw in OpenClaw AI agent could allow rapid injection and data leakage

March 14, 2026

GlassWorm supply chain attack exploits 72 open VSX extensions to target developers

March 14, 2026

Chinese hackers target Southeast Asian militaries with AppleChris and MemFun malware

March 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

US Army announces contract worth up to $20 billion with Anduril

Honda will discontinue EVs and have no chance of competing in the future.

Flaw in OpenClaw AI agent could allow rapid injection and data leakage

As people look for ways to make new friends, here are some apps that may come in handy.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.