💬 Telegram plays an important role in many underground businesses. Threat actors commonly stand up channels to market and support malicious activities such as malware-as-a-service (MaaS) subscriptions. While investigating ScreenConnect servers, a remote access support tool commonly abused by threat actors, we found an interesting business that we had never seen before. This actor used telegram as a storefront and support channel for an underground Remote Access Toolkit Online (RATO) platform. Technically RATO is a service that bundles cPanel and ScreenConnect technology to help its cyber criminal customers remotely access victim machines and manage scams, phishing, and malware (e.g. Latrodectus).

🐀 🔴 We discovered several servers that matched a ScreenConnect signature but these instances did not serve the typical ScreenConnect web content. Instead, their service is called "RATO PLATFORM" and the portal page shows the slogan "Can't catch the RAT__". We've found several telegram channels that promote services named "RATO", use the rat head logo (see attached image), or the domain rato[.]to. Based on their telegram chat content, it's clear their business model is focused on enabling cybercrime.

@rato_support
@ratofaqs
@rato_backup
@rato_hosting
@Rato2_bot

Consistent with RATO’s “BulletProof & Anti-Red Hosting” feature, we saw many RATO instances on ASNs with a high concentration of malicious activity (e.g., AS202412). Additionally, RATO infrastructure shows strong ties to Indonesia including Indonesian IP addresses in passive DNS and domains within the same cloudflare account used for serving online gambling to Indonesian-speaking users. Collectively, RATO and its customers operate a large number of domains. Here are some examples:

asakusubinitohas[.]com
bmw320ikaka[.]co
cpusx[.]com
newoneazu[.]com
ratmail[.]pro
rato[.]page
rato[.]to
ratodemo[.]pro
sesrecipt[.]com
silk-gen[.]com
sunostart[.]com
viewyourstatementonline[.]com

#dns #threatintel #threatintelligence #cybercrime #cybersecurity #infosec #infoblox #infobloxthreatintel #scam #phishing #malware #maas #telegram #indonesia #screenconnect #latrodectus #rat #rmm #remotemonitoringmanagement #downloader #spam #rato

The black widow was very active and on display during feeding today 😍. #spiders #SpidersOfTheFediverse #spidersofmastodon #blackwidowspiders #latrodectus
Extracting VNC screenshots and keylog data from #Latrodectus 🕷️ BackConnect
https://netresec.com/?b=25Cfd08
Latrodectus BackConnect

I recently learned that the great folks from The DFIR Report have done a writeup covering the Latrodectus backdoor. Their report is titled From a Single Click: How Lunar Spider Enabled a Near Two-Month Intrusion. I found it particularly interesting that the threat actors used Latrodectus to drop a B[...]

Netresec

La semaine dernière, j'ai eu la chance d'aller à @UYBHYS , où j'ai rencontré quelques fans - et quelques détracteurs qui ne voyaient pas le crocodile en moi, mais une mouette (ils ont trop mangé de palourdes !).
Ca méritait bien un petit dessin avec des tas de clins d'oeil que je vais laisser à chacun le plaisir de découvrir ;)
PS. Rien qu'avec les crêpes du jeudi soir, j'étais déjà content d'être venu à la conférence - et elle n'avait pas encore débuté. C'est dire.

#UYBHYS25 #blagues #conférence #sécurité #rump #ASN1 #latrodectus #frigo #CIRCL #qemu

📢 Red Canary: Tampered Chef (malware Node.js stéganographique) domine le rapport de menaces de septembre 2025
📝 Red Canary publie son rapport de threat intelligence de septembre...
📖 cyberveille : https://cyberveille.ch/posts/2025-10-24-red-canary-tampered-chef-malware-node-js-steganographique-domine-le-rapport-de-menaces-de-septembre-2025/
🌐 source : https://redcanary.com/blog/threat-intelligence/intelligence-insights-october-2025/
#Akira_ransomware #Latrodectus #Cyberveille
Red Canary: Tampered Chef (malware Node.js stéganographique) domine le rapport de menaces de septembre 2025

Red Canary publie son rapport de threat intelligence de septembre 2025, détaillant les menaces les plus observées dans les environnements clients et comparant plusieurs trojans similaires. 🔎 En tête, Tampered Chef apparaît comme un malware Electron/Node.JS qui traite du contenu stéganographié exécutant du code JavaScript arbitraire. Il se fait passer pour des applications de recettes ou de calendrier, avec une distribution via encarts/‍bannières publicitaires promouvant des outils de comptage de calories. Ses différenciateurs techniques clés incluent une architecture Electron Node.JS, des communications C2 basées sur la stéganographie, et une transition trompeuse de PUP vers malware.

CyberVeille

We've observed an interesting infection chain ⛓️ in the wild, starting with #LummaStealer spread through a fake gaming website and resulting in #Latrodectus and #SectopRat 🪲🔍👀

See below for more ⬇️

Operation Endgame 2: 15 Millionen E-Mail-Adressen und 43 Millionen Passwörter

Bei "Operation Endgame 2.0" kamen viele Millionen Adressen und Passwörter von Opfern ans Licht. Have I Been Pwned hat sie aufgenommen.

heise online
Operation Endgame 2.0: 20 Haftbefehle, Hunderte Server außer Gefecht gesetzt

Das BKA, Europol und weitere internationale Ermittlungsbehörden gehen weiter gegen Malware vor. Gegen mehr als 20 Akteure ergingen Haftbefehle und Anklagen.

heise online

🔥 Operation Endgame is BACK! This time targeting #BumbleBee, #Latrodectus, #DanaBot, #WarmCookie, #Qakbot and #Trickbot!

Once again this is a HUGE win, with a truly international effort! 💪

As with phase one of #OperationEndgame, Spamhaus are providing remediation support - those affected will be contacted in due course with steps to take.

For more information, read our write-up here:
👉 https://www.spamhaus.org/resource-hub/malware/botnets-disrupted-worldwide-operation-endgame-is-back/

Malware | Operation Endgame 2.0 | Botnets disrupted after international action | Resources

Operation Endgame is back - in this post, get details of the take-down itself and Spamhaus’ role in victim account remediation.

The Spamhaus Project