Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Lazarus Hackers Exploit ZeroDay, Deploy Rats

September 4, 2025
Reading Time: 3 mins read
in Alerts
Lazarus Hackers Exploit ZeroDay, Deploy Rats

A sophisticated Lazarus subgroup has been actively targeting financial and cryptocurrency organizations over the past two years, using a suite of remote access trojans (RATs) to infiltrate and control compromised systems. This group, which has been identified as a significant threat actor, overlaps with well-known campaigns like AppleJeus, Citrine Sleet, UNC4736, and Gleaming Pisces. The core of their operation relies on a trio of malicious tools: PondRAT, ThemeForestRAT, and RemotePE, each playing a specific role in their multi-stage intrusion process. Their tactics, techniques, and procedures (TTPs) are highly advanced, as demonstrated in a 2024 incident response case where a decentralized finance firm was compromised through a meticulously planned attack.

The 2024 incident began with a social engineering attack on a firm employee. The attacker, impersonating a colleague, lured the victim into a Telegram conversation and directed them to a spoofed meeting site. Shortly after the victim accessed the site, PondRAT was deployed on their Windows machine. Forensic analysis revealed a suspicious drop in endpoint logging, which suggested a suspected Chrome zero-day exploit was used to execute the code without detection. Over the next three months, the attackers used PondRAT in conjunction with custom-built tools, including a screenshotter, keylogger, and browser dumper, to harvest credentials and map the network. They also used public utilities like Mimikatz and the Fast Reverse Proxy client to further their reconnaissance.

Once the initial reconnaissance phase was complete, the attackers removed the PondRAT and ThemeForestRAT artifacts and installed RemotePE, a more advanced RAT, on the victim’s system. This likely served to maintain deeper, more persistent access to the high-value target. PondRAT, often referred to as a “firstloader,” has been in use since at least 2021 and is known for its ties to the AppleJeus campaign. It shares many similarities with the older POOLRAT/SimpleTea family, including identical XOR keys, function names, and a unique bot-ID generation scheme. However, it is a lighter-weight variant, lacking features like timestomping and C2 configuration files, which aligns with its primary role as an initial loader.

ThemeForestRAT has remained largely unanalyzed by the public despite its use for over six years. It’s often loaded into memory via PondRAT and offers a wide array of commands, including secure file deletion, timestomping, and in-process shellcode injection. It operates by spawning two threads on Windows systems: one that creates a temporary folder and another that monitors console and RDP sessions to execute configured commands. The configuration for ThemeForestRAT is stored in a 43 KB RC4-encrypted file called netraid.inf, which defines C2 URLs and other operational parameters. Its C2 protocol utilizes HTTP(S) file transfers prefixed with “ThemeForest_” and “Thumb_.”

The design of ThemeForestRAT shares core features with the RomeoGolf RAT from 2013, suggesting a clear line of code inheritance within the Lazarus group. These shared features include the use of two signaling threads, config-file timestomping, and unique-ID routines. Interestingly, the functionality to detect and copy data from newly attached logical drives, a feature present in its predecessors, has been removed in ThemeForestRAT, while the temporary directory creation remains intact. This evolution in the RAT’s design highlights the attackers’ continuous efforts to refine their tools and adapt to changing security landscapes.

Reference:

  • Lazarus Hackers Exploit Zero Day To Deploy Three Remote Access Trojans
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecuritySeptember 2025
ADVERTISEMENT

Related Posts

Lazarus Hackers Exploit ZeroDay, Deploy Rats

CISA Flags TP Link Router Flaws

September 4, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

September 4, 2025
WhatsApp Scam Lets Hackers Hijack Chats

WhatsApp Scam Lets Hackers Hijack Chats

September 4, 2025
WhatsApp Scam Lets Hackers Hijack Chats

Android Droppers Turn Into Malware Tools

September 4, 2025
WhatsApp Scam Lets Hackers Hijack Chats

Malicious Npm Package Mimics Nodemailer

September 4, 2025
Sitecore Exploit Chain Warning

High Risk SQLi In WordPress Plugin

September 2, 2025

Latest Alerts

CISA Flags TP Link Router Flaws

Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

WhatsApp Scam Lets Hackers Hijack Chats

Malicious Npm Package Mimics Nodemailer

Android Droppers Turn Into Malware Tools

Subscribe to our newsletter

    Latest Incidents

    Salesloft Drift Attacks Hits Vendors

    Jaguar Land Rover Hit By Cyber Incident

    Hackers Use Grok Ai To Spread Malware

    Austria Ministry Reports Email Breach

    Hackers Breach Fintech In Bank Heist Try

    Ransomware Hits Pennsylvania AG Office

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial