Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

Rhadamanthys (Trojan) – Malware

June 10, 2024
Reading Time: 3 mins read
in Malware
Rhadamanthys (Trojan) – Malware

Rhadamanthys

Type of Malware

Trojan

Country of Origin

Russia

Date of initial activity

2022

Targeted Countries

United States
United Kingdom
Germany
Australia
India

Associated Groups

Sandworm

Motivation

Financial Gain, Data Theft

Attack Vectors

Phishing, Web Browsing

Targeted Systems

Windows

Type of information Stolen

Browser Data
Communication Data
Corporate Data
Financial Information
Personal Identifiable Information (PII)
System Information
Login credentials

Overview

Rhadamanthys is a sophisticated piece of malware designed for information theft, showcasing a highly modular and adaptive architecture. First emerging as a significant threat in the cybersecurity landscape, Rhadamanthys has undergone numerous updates and enhancements, with its latest major release being version 0.5.0. This latest iteration, discovered in December 2023, exemplifies the malware’s evolution by incorporating advanced features and improvements over its predecessors. The Rhadamanthys stealer operates through a multi-layered approach, leveraging a combination of custom executable formats and a plugin system to expand its functionality. The malware’s design allows it to execute a variety of malicious activities, including data exfiltration and system spying, by using an array of interconnected modules. Each module serves a specific purpose, from initial infection to the extraction of sensitive information, making Rhadamanthys a versatile and formidable threat in the cybercriminal arsenal.

Targets

Individual Targets working in multiple sectors like Information, Government agencies, etc. and also individual users in general

How they operate

At its core, Rhadamanthys employs a combination of tactics to gain initial access to its targets. This includes leveraging phishing emails with malicious attachments or links, which, once interacted with, initiate the malware’s payload. Once inside, Rhadamanthys uses various execution techniques to ensure its persistence on the infected system. It can deploy scripts or use legitimate system tools to execute its code, ensuring that its operations continue even after a system reboot or user intervention. The malware’s persistence mechanism is particularly sophisticated. Rhadamanthys embeds itself into the system’s startup processes, making it difficult to remove through conventional means. It achieves this by modifying system registries and scheduling tasks that re-initiate its execution, thereby maintaining control over the compromised environment. Privilege escalation is another critical aspect of Rhadamanthys’s operation. By exploiting known vulnerabilities or misconfigurations within the target system, it elevates its permissions, allowing it to perform actions that are typically restricted. This capability not only enhances its control over the infected system but also facilitates further attacks on other networked systems. Defense evasion is a fundamental component of Rhadamanthys’s strategy. The malware is equipped with various techniques to avoid detection by security tools. It uses encryption to obscure its payload and employs anti-analysis techniques to hinder reverse engineering efforts. By disguising its presence and minimizing its footprint, Rhadamanthys evades standard security measures, making it harder to identify and neutralize. In terms of credential access, Rhadamanthys targets stored credentials and session tokens to gain unauthorized access to additional systems and data. Its discovery phase involves mapping the network and identifying valuable targets, which are then subjected to further attacks. Lateral movement techniques allow Rhadamanthys to spread across networks, amplifying its impact and reach. Collection and exfiltration are the final stages of Rhadamanthys’s operation. Once it has gathered sufficient data, including sensitive information and system credentials, it securely transmits this information to remote servers controlled by the attackers. This data can then be used for various malicious purposes, such as identity theft, financial fraud, or further cyber espionage activities.

MITRE Tactics and Techniques

Initial Access (TA0001) Execution (TA0002) Persistence (TA0003) Privilege Escalation (TA0004) Defense Evasion (TA0005) Credential Access (TA0006) Discovery (TA0007) Lateral Movement (TA0008) Collection (TA0009) Exfiltration (TA0010) Impact (TA0011)
References
  • Rhadamanthys v0.5.0 – a deep dive into the stealer’s components
Tags: CybercriminalCybersecurityGovernmentMalwareRhadamanthysRussiaTrojan
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

CoGUI Targets Consumer and Finance Brands

COLDRIVER Hackers Target Sensitive Data

Cisco Fixes Flaw in IOS Wireless Controller

New OttoKit Flaw Targets WordPress Sites

Mirai Botnet Exploits Vulnerabilities in IoT

Critical Kibana Flaws Allows Code Execution

Subscribe to our newsletter

    Latest Incidents

    Masimo Cyberattack Disrupts Manufacturing

    Cyberattack Targets Tepotzotlán Facebook

    West Lothian Schools Hit by Ransomware

    UK Legal Aid Agency Faces Cyber Incident

    South African Airways Hit by Cyberattack

    Coweta County School System Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial