Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The man who bet everything on AI and Bill Belichick

Making earth observation data useful to people

MSS claims NSA used 42 cyber tools in multi-stage attack on Beijing Time System

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » The new Godratotrojan is targeting trading companies using steganography and GH0st rat code
Identity

The new Godratotrojan is targeting trading companies using steganography and GH0st rat code

userBy userAugust 19, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 19, 2025Ravi LakshmananMalware/Cyber Attacks

Steganography and GH0st rat code

Financial institutions such as trading and brokerage companies are the targets of new campaigns offering previously unreported remote access trojans called Godrat.

Malicious activities include “distribution of malicious .SCR (screensaver) files disguised into financial documents via Skype Messenger.”

The attack, which became active on August 12, 2025, employs a technique called Steganography to hide it within the image file shellcode used to download malware from a command and control (C2) server. Screensaver artifacts have been detected since September 9, 2024 and are targeting countries and territories such as Hong Kong, the United Arab Emirates, Lebanon, Malaysia and Jordan.

GoDrat is rated as being based on GH0st rats and follows a plugin-based approach that enhances functionality to harvest sensitive information and provide secondary payloads like Asyncrat. It is worth mentioning that Gh0st rats publicly leaked their source code in 2008 and have since been adopted by various Chinese hacking groups.

Cybersecurity

The Russian cybersecurity company said the malware is another GH0st rat-based backdoor evolution known as Awesome Puppet, first documented in 2023, and is considered to be the handiwork of prolific Chinese threat actor Winnti (aka APT41).

Screen Saver files act as self-extracting executables that incorporate a variety of embedded files, including secondary DLLs by legitimate executables. The DLL extracts the hidden shellcode within the .jpg image file, paving the way for Godrat to unfold.

The Trojan establishes communication with the C2 server over TCP, gathers system information, and pulls out a list of antivirus software installed on the host. The captured details are sent to the C2 server, and the server then responds with a follow-up procedure that allows it –

Insert the received plugin into memory to close the socket and terminate the rat process.

One plugin downloaded by the malware is a FileManager DLL that allows you to enumerate file systems, perform file operations, perform open folders, and perform searches for files at specified locations. This plugin is also used to deliver additional payloads, such as Google Chrome, Microsoft Edge browsers and password steelers for Asyncrat Trojan.

Kaspersky said it discovered the complete source code for the Godrat client and builder that was uploaded to the Virustotal Online Malware scanner in late July 2024. The builder can be used to generate either an executable or an A DLL.

Identity Security Risk Assessment

When the executable option is selected, the user chooses to select the legitimate binaries from the list where malicious code is injected into svchost.exe, cmd.exe, cscript.exe, curl.exe, wscript.exe, qqmusic.exe and qqsclauncher.exe. The final payload can be saved in one of the following file types: .exe, .com, .bat, .scr, and .pif.

“Older implant codebases such as GH0st rats from nearly 20 years ago continue to be used today,” Kaspersky says. “These are often customized and rebuilt to target a wide range of victims.”

“These older implants are known to have been used for a long time by a variety of threat actors, and Godrat’s findings show that legacy codebases like the GH0st rats can still maintain long lifespans in cybersecurity landscapes.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUS spy chief says the UK has removed demand for apple backdoors
Next Article Aalo Atomics raises $100 million to build microreactors and data centers together
user
  • Website

Related Posts

MSS claims NSA used 42 cyber tools in multi-stage attack on Beijing Time System

October 20, 2025

Europol dismantles SIM farm network running 49 million fake accounts worldwide

October 19, 2025

New .NET CAPI backdoor targets Russian car and e-commerce companies via phishing ZIPs

October 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The man who bet everything on AI and Bill Belichick

Making earth observation data useful to people

MSS claims NSA used 42 cyber tools in multi-stage attack on Beijing Time System

OpenAI’s “Embarrassing” Mathematics | Tech Crunch

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.