• Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
No Result
View All Result
Home Cyber

New Windows RAT Exploits Corrupted Headers for Stealthy Evasion

Jane Doe by Jane Doe
May 31, 2025
in Cyber
New Windows RAT Exploits Corrupted Headers for Stealthy Evasion
Share on FacebookShare on Twitter

Security researchers have discovered a new wave of Windows Remote Access Trojan (RAT) [RAT] that’s using a simple but effective new technique to evade antivirus software by scrambling its signature.

This innovative method seriously hinders the common practice of malware analysis and detection and carries an serious potential of danger to many windows systems worldwide.

This RAT, which has been found by Fortinet, works by deliberately damaging the DOS (Disk Operating System) and PE (Portable Executable) headers within its own executable.

Read

App Store Power and Censorship: How Apple and Google Shape Your Digital Future

Google Sets Sights on Defying Gravity with Antigravity Project

In order for the Windows operating system to identify and launch programs, these headers are necessary. Corrupting this basic information disables traditional security tools, which depend on headers to characterize and pattern-match Internet traffic through static analysis.

This potentially enables the RAT to remain on compromised systems for weeks without being noticed by the system’s defense mechanisms, the researchers say.

One must use other methods (such as memory forensics, and reproducing as closely as one can the exact circumstances of the affected machine) to investigate the behavior of the malware.

In the incident it was found that the RAT was being executed under a valid dllhost. exe, thus providing an additional layer of obfuscation to its malicious behavior.

Upon execution, the RAT decrypts its C2 server address in memory and creates a secure C&C communication channel based on the TLS protocol. The primary thread goes dormant, waiting for commands from C2 server via another communication thread.

Upon additional analysis the new RAT was found to have a wide range of malicious features, such as:

  • Screenshot Capture: Capturing the user’s screen secretly.
  • System Service Manipulation: Enumeration and controlling the system services on the compromised machine.
  • Server Mode: If it’s acting as an attacker to listen for incoming connections from attacker, turning the compromised machine into a listening platform.

The RAT also uses multi-threaded socket architecture to accept multiple connections at the same time from attackers, so that more sophisticated and coordinated operations can be carried out.

This finding demonstrates the progressive maturity of cyber threats and the ongoing requirement for progressive detection and analysis methodologies.

Companiest are encouraged to adopt stronger security practices and tools that are capable of analyzing memory, watch for legitimate processes acting in abnormal ways, in addition, audit the API usage for detection of potentially suspicious operations.

Network traffic analysis can also identify aberrant outbound connections related to C2 communications as well. Addendum: User awareness is key in stopping initial infections that use social engineering techniques.

The cyber-security community is currently pay attention of the threat to find possible mitigations and detection signatures. More details on the structure of the RAT as well as specific indicators of compromise will likely be provided in the next days.

This once again highlights the ‘whack-a-mole’ game of brinkmanship that cybersecurity and online criminals have long taken part in, as we have seen emerging threats being countered at breakneck speed.

Previous Post

The Global Threat of Earth Lamia: Chinese Hackers on the Rise

Next Post

Altair Unveils transformative AI-Powered Engineering Solutions at Paris Air Show 2025

Jane Doe

Jane Doe

More Articles

Operation WrtHug Hijacks Tens of Thousands ASUS Routers
Latest News

Operation WrtHug Hijacks Tens of Thousands ASUS Routers

Massive Infection: Tens of thousands of end-of-life ASUS WRT routers compromised worldwide, mainly in Taiwan, the US, and Russia. Exploit...

by Sumit Chauhan
November 19, 2025
WhatsApp Worm Delivers Brazilian Banking Trojan
Cyber

WhatsApp Worm Delivers Brazilian Banking Trojan

Worm Spread: Python-scripted WhatsApp worm targets Brazil, hijacking accounts to send a Delphi-based banking trojan, Eternidade Stealer. Infection Path: Starts...

by Sumit Chauhan
November 19, 2025
FBI Sounds Alarm on Akira Ransomware’s 0 Million Haul
Cyber

FBI Sounds Alarm on Akira Ransomware’s $250 Million Haul

Ransom Total: $248.9 million from 321 victims—mostly US firms in tech, finance, healthcare since May 2023. Tactics: Double extortion—encrypts files,...

by Max Mueller
November 16, 2025
US Car Dealers Grind to Halt in CDK Ransomware Chaos
Cyber

US Car Dealers Grind to Halt in CDK Ransomware Chaos

Scale Hit: 15,000+ dealerships across US and Canada offline—sales, financing, service apps down for weeks. Financial Sting: $1.2 billion lost...

by Mayank Singh
November 16, 2025
Next Post
Altair Unveils transformative AI-Powered Engineering Solutions at Paris Air Show 2025

Altair Unveils Revolutionary AI-Powered Engineering Solutions at Paris Air Show 2025

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Latest News

China Accuses US of Cyberattacks Using Microsoft Email Server Flaws

China Accuses US of Cyberattacks Using Microsoft Email Server Flaws

August 1, 2025
Online Scam Cases Continue to Rise Despite Crackdowns on Foreign Fraud Networks [Myanmar]

Online Scam Cases Continue to Rise Despite Crackdowns on Foreign Fraud Networks [Myanmar]

June 30, 2025
Stay Safe from Ransomware Using Skitnet Malware Techniques

Stay Safe from Ransomware Using Skitnet Malware Techniques

May 20, 2025
MMaDA-Parallel: Advanced Multimodal Model Revolutionizing Content Generation

MMaDA-Parallel: Advanced Multimodal Model Revolutionizing Content Generation

November 19, 2025
Anthropic Blocks AI Misuse for Cyberattacks

Anthropic Blocks AI Misuse for Cyberattacks

August 28, 2025
New VoIP Botnet Targets Routers Using Default Passwords

New VoIP Botnet Targets Routers Using Default Passwords

July 25, 2025
Aflac Incorporated Discloses Cybersecurity Incident

Aflac Incorporated Discloses Cybersecurity Incident

June 20, 2025
Sumtrix.com

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Navigate Site

  • About
  • Contact
  • Privacy Policy
  • Advertise

Follow Us

No Result
View All Result
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Our website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.