Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

Malware injected into 6 npm package after maintainer token was stolen in a phishing attack

Hackers exploit critical CrushFTP flaws to gain admin access on unearned servers

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Chaos Rat Malware Targets Window and Linux via fake network tools download
Identity

Chaos Rat Malware Targets Window and Linux via fake network tools download

userBy userJune 4, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 4, 2025Ravi LakshmananLinux/Malware

Chaos Rat Malware

Threat Hunters are turning their attention to a new variant of the remote access trojan (rat), called Chaos Rat, which has been used in recent attacks targeting Windows and Linux systems.

According to Acronis research findings, malware artifacts may have been distributed by trinking victims to download network troubleshooting utility in Linux environments.

“Chaos Rat is an open source rat written in Golang and provides cross-platform support for both Windows and Linux systems,” security researchers Santiago Pontiroli, Gabor Molnar and Kirill Antonenko said in a report shared with Hacker News.

“Inspired by popular frameworks like Cobalt Strike and Sliver, Chaos Rat offers an admin panel that lets users build payloads, establish sessions and control compromised machines.”

Work on the “Remote Management Tool” began in 2017, but it didn’t attract attention until December 2022, when it was used in malicious campaigns targeting public web applications hosted on Linux Systems using XMRIG Cryptocurrency Miner.

Cybersecurity

Once the installation is installed, the malware will connect to an external server, launch a reverse shell, upload/download/delete files and deletions, enumerate files and directories, take screenshots, gather system information, lock/restart/shutdown the machine, and wait for commands that can open any URL. The latest version of Chaos Rat is 5.0.3 and was released on May 31, 2024.

Acronis said Linux variants of malware are often detected in the wild, in connection with cryptocurrency mining campaigns. The attack chain observed by the company indicates that chaos lats are distributed to victims via phishing emails containing malicious links or attachments.

These artifacts are designed to allow you to regularly retrieve malware as a way to set up persistence by dropping malicious scripts that can modify the task scheduler “/etc/crontab”.

Download fake network tools

“Early campaigns used this technique to provide cryptocurrency miners and chaos rats individually, indicating that chaos was primarily adopted for reconnaissance and intelligence gathering on compromised devices,” the researchers said.

An analysis of a recent sample uploaded from India to Virustotal in January 2025 from India named “NetworkAnalyzer.tar.gz” has increased the likelihood that users are being deceived by malware downloads by masquerading as a network troubleshooting in Linux environments.

Furthermore, admin panels that allow users to build payloads to manage infected machines are known to be susceptible to command injection vulnerabilities (CVE-2024-30850, CVSS score: 8.8) that can be combined with cross-site scripting flaws (CVE-2024-31839, CVSS score: 4.8). Both vulnerabilities have since been addressed by Chaos Rat maintainers as of May 2024.

While it is not clear who is behind the use of chaos lats in real-world attacks at present, this development once again shows how threat actors can weaponize open source tools in their advantage and continue to disrupt attribution efforts.

Cybersecurity

“What starts as a developer’s tool can quickly become a means of selecting threat actors,” the researchers said. “With publicly available malware, APT groups blend into the noise of everyday cybercrime. Open source malware offers a ‘sufficient’ toolkit that can be customized and deployed quickly. Multiple actors use the same open source malware, confuses the water of attribution. ”

This disclosure coincides with the emergence of new campaigns targeting Trust Wallet users on desktops via a bundle of software intended to target Trust Wallet users on desktops, via down-download links, phishing emails, or browser entitlements, extract data from desktop-based wallets, extract from browser extensions, execute instructions, and act as clipper malware.

“When installed, malware can scan wallet files, intercept clipboard data, and monitor browser sessions by capturing seed phrases and private keys,” Point Wild Researcher Kedar S Pandit said in a report published this week.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhy traditional DLP solutions fail in the browser era
Next Article Bolttech will close Series C at $147 million at a $2.1 billion valuation to strengthen embedded insurance offerings
user
  • Website

Related Posts

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

July 20, 2025

Malware injected into 6 npm package after maintainer token was stolen in a phishing attack

July 20, 2025

Hackers exploit critical CrushFTP flaws to gain admin access on unearned servers

July 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

Malware injected into 6 npm package after maintainer token was stolen in a phishing attack

Hackers exploit critical CrushFTP flaws to gain admin access on unearned servers

Astronomer CEO resigns following Cold Play Concert Scandal

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.