Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Thousands of Grok chats are now searchable on Google

New Zero-Day startup offers $20 million for a tool that can hack your smartphone

Experts have discovered that AI browsers can be tricked by ProsptFix exploits to run malicious hidden prompts

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » The new Godratotrojan is targeting trading companies using steganography and GH0st rat code
Identity

The new Godratotrojan is targeting trading companies using steganography and GH0st rat code

userBy userAugust 19, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 19, 2025Ravi LakshmananMalware/Cyber Attacks

Steganography and GH0st rat code

Financial institutions such as trading and brokerage companies are the targets of new campaigns offering previously unreported remote access trojans called Godrat.

Malicious activities include “distribution of malicious .SCR (screensaver) files disguised into financial documents via Skype Messenger.”

The attack, which became active on August 12, 2025, employs a technique called Steganography to hide it within the image file shellcode used to download malware from a command and control (C2) server. Screensaver artifacts have been detected since September 9, 2024 and are targeting countries and territories such as Hong Kong, the United Arab Emirates, Lebanon, Malaysia and Jordan.

GoDrat is rated as being based on GH0st rats and follows a plugin-based approach that enhances functionality to harvest sensitive information and provide secondary payloads like Asyncrat. It is worth mentioning that Gh0st rats publicly leaked their source code in 2008 and have since been adopted by various Chinese hacking groups.

Cybersecurity

The Russian cybersecurity company said the malware is another GH0st rat-based backdoor evolution known as Awesome Puppet, first documented in 2023, and is considered to be the handiwork of prolific Chinese threat actor Winnti (aka APT41).

Screen Saver files act as self-extracting executables that incorporate a variety of embedded files, including secondary DLLs by legitimate executables. The DLL extracts the hidden shellcode within the .jpg image file, paving the way for Godrat to unfold.

The Trojan establishes communication with the C2 server over TCP, gathers system information, and pulls out a list of antivirus software installed on the host. The captured details are sent to the C2 server, and the server then responds with a follow-up procedure that allows it –

Insert the received plugin into memory to close the socket and terminate the rat process.

One plugin downloaded by the malware is a FileManager DLL that allows you to enumerate file systems, perform file operations, perform open folders, and perform searches for files at specified locations. This plugin is also used to deliver additional payloads, such as Google Chrome, Microsoft Edge browsers and password steelers for Asyncrat Trojan.

Kaspersky said it discovered the complete source code for the Godrat client and builder that was uploaded to the Virustotal Online Malware scanner in late July 2024. The builder can be used to generate either an executable or an A DLL.

Identity Security Risk Assessment

When the executable option is selected, the user chooses to select the legitimate binaries from the list where malicious code is injected into svchost.exe, cmd.exe, cscript.exe, curl.exe, wscript.exe, qqmusic.exe and qqsclauncher.exe. The final payload can be saved in one of the following file types: .exe, .com, .bat, .scr, and .pif.

“Older implant codebases such as GH0st rats from nearly 20 years ago continue to be used today,” Kaspersky says. “These are often customized and rebuilt to target a wide range of victims.”

“These older implants are known to have been used for a long time by a variety of threat actors, and Godrat’s findings show that legacy codebases like the GH0st rats can still maintain long lifespans in cybersecurity landscapes.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUS spy chief says the UK has removed demand for apple backdoors
Next Article Aalo Atomics raises $100 million to build microreactors and data centers together
user
  • Website

Related Posts

Experts have discovered that AI browsers can be tricked by ProsptFix exploits to run malicious hidden prompts

August 20, 2025

Discover and control Shadow AI agents in your company before hackers do it

August 20, 2025

Turn BIA insights into resilient recovery

August 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Thousands of Grok chats are now searchable on Google

New Zero-Day startup offers $20 million for a tool that can hack your smartphone

Experts have discovered that AI browsers can be tricked by ProsptFix exploits to run malicious hidden prompts

Discover and control Shadow AI agents in your company before hackers do it

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Genius of Frustration: Tim Berners-Lee on Creating the Internet We Know

What’s Wrong with the Web? Tim Berners-Lee Speaks Out in Rare Interview

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

The AI-Powered Career Path: How TwinH by FySelf Evolves Your Digital Professional Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.