The netclient module, responsible for communication with the Command and Control (C2) server, has undergone substantial modifications, now employing sophisticated mechanisms to evade analysis and monitor activities discreetly.

#Cybersecurity #DataStealer #Malware #Cyberthreat

https://cybersec84.wordpress.com/2023/12/16/exploring-rhadamanthys-0-5-0-unveiling-the-intricate-components-of-this-data-stealer/

New Rhadamanthys 0.5.0: The Anatomy of a Dangerous Data Stealer

In a recent report by Check Point Research, it has been revealed that the Rhadamanthys information thief has undergone a substantial update, now progressing to version 0.5.0. This update introduces…

CyberSec84 | Cybersecurity news.
Besides incorporating more anti-analysis and anti-virtualization checks, Typhon Reborn V2 removes its persistence features, instead opting to terminate itself after exfiltrating the data.
The malware ultimately transmits the collected data in a compressed archive via HTTPS using the Telegram API, marking continued abuse of the messaging platform. https://thehackernews.com/2023/04/typhon-reborn-stealer-malware.html #CyberSecurity #TyphoonStealerV2 #DataStealer #TelegramAPI
Typhon Reborn Stealer Malware Resurfaces with Advanced Evasion Techniques

Typhon Reborn V2, a new version of the information-stealing malware, has emerged with enhanced capabilities to evade detection.

The Hacker News
7 types of virus – a short glossary of contemporary cyberbadness - Here's a short list of 7 malware categories we hope you never encounter. Sadly, it's not an exhaus... more: https://nakedsecurity.sophos.com/2019/12/28/7-types-of-virus-a-short-glossary-of-contemporary-cyberbadness/ #bankingtrojan #datastealer #ramscraper #ransomware #keylogger #malware #rat
7 types of virus – a short glossary of contemporary cyberbadness

Naked Security