Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

PureCrypter Deploys TorNet Backdoor

January 29, 2025
Reading Time: 2 mins read
in Alerts

A financially motivated threat actor has been conducting an ongoing phishing campaign targeting users in Poland and Germany since at least July 2024. The campaign has led to the deployment of several payloads, including Agent Tesla, Snake Keylogger, and a newly discovered backdoor named TorNet. Delivered through the PureCrypter malware, TorNet facilitates communication with victim machines over the TOR network, which helps the attacker maintain anonymity. The threat actor uses various techniques to evade detection, such as disconnecting the victim machine from the network before deploying the payload and then reconnecting it afterward.

The phishing emails used in the campaign often impersonate financial institutions or manufacturing companies, with fake money transfer confirmations or order receipts. These emails contain compressed file attachments (.tgz) that are likely designed to bypass detection. Once extracted, the files execute a .NET loader that subsequently runs the PureCrypter malware in memory.

This malware then deploys the TorNet backdoor after performing a series of checks to evade analysis, including anti-debugging and anti-malware techniques.

Once deployed, the TorNet backdoor establishes a connection to the command-and-control (C2) server and connects the victim machine to the TOR network. This allows the attacker to remotely execute arbitrary .NET assemblies on the compromised system, significantly expanding the potential attack surface. This ability to remotely execute code increases the risk of further intrusions or exploitation. Additionally, the attacker maintains persistence on the victim’s machine using a Windows scheduled task, which is executed even when the device is running on a low battery.

A notable technique observed in these attacks is hidden text salting, which is used to evade email detection engines. By including visually unrecognizable characters in the email’s HTML code, the attacker can bypass spam filters and other email parsers. To counter these types of attacks, experts recommend improving email filtering techniques to detect hidden text salting and using visual similarity detection methods to better identify concealed content. Additionally, developing advanced filtering systems that identify altered CSS properties could further enhance detection capabilities against such evasion tactics.

Reference:
  • PureCrypter Uses TorNet Backdoor in Ongoing Phishing Campaign
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityJanuary 2025
ADVERTISEMENT

Related Posts

Chrome Extensions Leak Data And API Keys

Chrome Extensions Leak Data And API Keys

June 6, 2025
Chrome Extensions Leak Data And API Keys

AMOS Stealer Hits macOS Via Fake CAPTCHA

June 6, 2025
Chrome Extensions Leak Data And API Keys

BADBOX Turns 1M+ IoT Devices Into Proxies

June 6, 2025
UNC6040 Vishing Group Target Salesforce Data

UNC6040 Vishing Group Target Salesforce Data

June 5, 2025
New Chaos RAT Variant Hits Windows and Linux

New Chaos RAT Variant Hits Windows and Linux

June 5, 2025
New Chaos RAT Variant Hits Windows and Linux

FBI Warns Hedera NFT Airdrop Crypto Scam

June 5, 2025

Latest Alerts

AMOS Stealer Hits macOS Via Fake CAPTCHA

Chrome Extensions Leak Data And API Keys

BADBOX Turns 1M+ IoT Devices Into Proxies

FBI Warns Hedera NFT Airdrop Crypto Scam

New Chaos RAT Variant Hits Windows and Linux

UNC6040 Vishing Group Target Salesforce Data

Subscribe to our newsletter

    Latest Incidents

    German Dog Rescue IG Hacked For Ransom

    Hack Attempt Hits German Police Phone System

    InfoJobs Spain Hit By Credential Stuffing

    KiranaPro Startup Hacked All Data Wiped

    Nervos Bridge Paused After $3.9 Million Hack

    Ukraine GUR Claims Tupolev Data Theft Hack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial