Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Rhadamanthys Stealer Evolves Again

October 7, 2025
Reading Time: 3 mins read
in Alerts
XWorm 6.0 Returns With New Plugins

First advertised by a threat actor named kingcrete2022, Rhadamanthys has become one of the most widely used information stealers available as a malware-as-a-service (MaaS) offering, competing with others like Lumma, Vidar, StealC, and Acreed. Initially promoted on cybercrime forums, the author soon transitioned to a more professional approach to attract and connect with potential customers. The current version of the malware is 0.9.2.

Over time, Rhadamanthys has evolved beyond basic data collection, becoming a sophisticated threat to both personal and corporate security. A previous analysis of an older version revealed a new optical character recognition (OCR) feature that uses artificial intelligence to capture cryptocurrency wallet seed phrases. The developers have now rebranded themselves as “RHAD security” and “Mythical Origin Labs,” marketing their products as “intelligent solutions for innovation and efficiency.” This new branding and business structure, which includes tiered pricing plans from $299 to $499 per month and an “Enterprise” option, suggest the authors see this as a long-term business rather than a temporary side project.

Like its competitor Lumma, the latest version of Rhadamanthys (0.9.2) includes a unique feature to prevent malware distributors from leaking unprotected copies. It displays an alert to the user that allows them to terminate the malware’s execution without causing any harm to their machine. This clever tactic is designed to thwart detection efforts. While the on-screen alert message is the same as Lumma’s, the underlying technical implementation is completely different, indicating that Rhadamanthys’ developers are mimicking the behavior for superficial purposes without copying the code.

The malware’s developers have also made a number of other updates, including minor changes to the custom format used for its executable modules and modifications to its anti-sandbox checks. One module, formerly called Strategy, performs a series of environment checks to ensure it is not running in a virtual or sandboxed environment. It checks for specific processes, usernames, and hardware identifiers associated with these environments. Only after passing all these checks does the malware connect to its command-and-control (C2) server to download its core components.

The core payload is hidden using steganography within a WAV, JPEG, or PNG file. It is then extracted, decrypted, and launched. Notably, decrypting the payload from a PNG file requires a shared secret that’s established during the initial C2 communication. Once launched, the stealer module uses a built-in Lua runner to execute additional plugins, which are responsible for data theft and extensive device and browser fingerprinting. Due to the ongoing evolution of the malware, security analysts are advised to continuously update their configuration parsers, monitor for PNG-based payload delivery, and track changes in obfuscation techniques. This professionalization of the Rhadamanthys operation signals that it’s likely here to stay and will continue to be a significant threat.

Reference:

  • Rhadamanthys Stealer Evolves With Device Fingerprinting And PNG Steganography Payloads
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityOctober 2025
ADVERTISEMENT

Related Posts

Imunify360 Flaw Puts Sites At Risk

Safery Extension Steals Crypto Wallets

November 14, 2025
Imunify360 Flaw Puts Sites At Risk

ChatGPT Flaw Exposed Core Infrastructure

November 14, 2025
Firefox Chrome Fix High Severity Bugs

Firefox Chrome Fix High Severity Bugs

November 13, 2025
Firefox Chrome Fix High Severity Bugs

CISA Warns Of WatchGuard Fireware Flaw

November 13, 2025
WhatsApp Malware Hits Brazil Banks

Npm Package Targets GitHub Repos

November 12, 2025
WhatsApp Malware Hits Brazil Banks

GootLoader Returns With Font Trick

November 12, 2025

Latest Alerts

Safery Extension Steals Crypto Wallets

ChatGPT Flaw Exposed Core Infrastructure

Firefox Chrome Fix High Severity Bugs

CISA Warns Of WatchGuard Fireware Flaw

Npm Package Targets GitHub Repos

GootLoader Returns With Font Trick

Subscribe to our newsletter

    Latest Incidents

    Hackers Breach NY State Texting Service

    Doordash Hit By October User Data Breach

    Synnovis Reports Data Theft In Attack

    Hyundai Breach Risks Drivers Data

    Hackers Demand 200K From Doctor Alliance

    GlobalLogic Confirms Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial