Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Rhadamanthys Stealer Evolves Again

October 7, 2025
Reading Time: 3 mins read
in Alerts
XWorm 6.0 Returns With New Plugins

First advertised by a threat actor named kingcrete2022, Rhadamanthys has become one of the most widely used information stealers available as a malware-as-a-service (MaaS) offering, competing with others like Lumma, Vidar, StealC, and Acreed. Initially promoted on cybercrime forums, the author soon transitioned to a more professional approach to attract and connect with potential customers. The current version of the malware is 0.9.2.

Over time, Rhadamanthys has evolved beyond basic data collection, becoming a sophisticated threat to both personal and corporate security. A previous analysis of an older version revealed a new optical character recognition (OCR) feature that uses artificial intelligence to capture cryptocurrency wallet seed phrases. The developers have now rebranded themselves as “RHAD security” and “Mythical Origin Labs,” marketing their products as “intelligent solutions for innovation and efficiency.” This new branding and business structure, which includes tiered pricing plans from $299 to $499 per month and an “Enterprise” option, suggest the authors see this as a long-term business rather than a temporary side project.

Like its competitor Lumma, the latest version of Rhadamanthys (0.9.2) includes a unique feature to prevent malware distributors from leaking unprotected copies. It displays an alert to the user that allows them to terminate the malware’s execution without causing any harm to their machine. This clever tactic is designed to thwart detection efforts. While the on-screen alert message is the same as Lumma’s, the underlying technical implementation is completely different, indicating that Rhadamanthys’ developers are mimicking the behavior for superficial purposes without copying the code.

The malware’s developers have also made a number of other updates, including minor changes to the custom format used for its executable modules and modifications to its anti-sandbox checks. One module, formerly called Strategy, performs a series of environment checks to ensure it is not running in a virtual or sandboxed environment. It checks for specific processes, usernames, and hardware identifiers associated with these environments. Only after passing all these checks does the malware connect to its command-and-control (C2) server to download its core components.

The core payload is hidden using steganography within a WAV, JPEG, or PNG file. It is then extracted, decrypted, and launched. Notably, decrypting the payload from a PNG file requires a shared secret that’s established during the initial C2 communication. Once launched, the stealer module uses a built-in Lua runner to execute additional plugins, which are responsible for data theft and extensive device and browser fingerprinting. Due to the ongoing evolution of the malware, security analysts are advised to continuously update their configuration parsers, monitor for PNG-based payload delivery, and track changes in obfuscation techniques. This professionalization of the Rhadamanthys operation signals that it’s likely here to stay and will continue to be a significant threat.

Reference:

  • Rhadamanthys Stealer Evolves With Device Fingerprinting And PNG Steganography Payloads
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityOctober 2025
ADVERTISEMENT

Related Posts

XWorm 6.0 Returns With New Plugins

XWorm 6.0 Returns With New Plugins

October 7, 2025
XWorm 6.0 Returns With New Plugins

Steam And Microsoft Warn Of Unity Flaw

October 7, 2025
CISA Adds New Flaws to KEV Catalog

Oracle Issues Security Alert

October 6, 2025
CISA Adds New Flaws to KEV Catalog

CISA Adds New Flaws to KEV Catalog

October 6, 2025
CISA Adds New Flaws to KEV Catalog

Hackers Exploit Zimbra Zero Day Flaw

October 6, 2025
Facebook Scams Target Seniors With Malware

Android Spyware Poses As Signal And Totok

October 3, 2025

Latest Alerts

XWorm 6.0 Returns With New Plugins

Steam And Microsoft Warn Of Unity Flaw

Rhadamanthys Stealer Evolves Again

Oracle Issues Security Alert

Hackers Exploit Zimbra Zero Day Flaw

CISA Adds New Flaws to KEV Catalog

Subscribe to our newsletter

    Latest Incidents

    Red Hat Data Breach Escalates Further

    FC Barcelona Instagram Hacked By Scam

    Threat Actors Claim Huawei Breach

    Discord Reveals Data Breach Incident

    Abracadabra Hit by Third DeFi Hack

    Extortion Group Launches Salesforce Data Leak

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial