ISC Diary: #LummaStealer infection with #SectopRAT (#ArechClient2) https://isc.sans.edu/diary/32904
SmartApeSG campaign pushes Remcos RAT, NetSupport RAT, StealC, and Sectop RAT (ArechClient2)
#SmartApeSG #RemcosRAT #Stealc #SecTopRAT
https://isc.sans.edu/diary/32826

2025-08-15 (Friday): Here are some images from a post I wrote for my employer on other social media platforms.

This is from a #LummaStealer infection that led to #SectopRAT (#ArechClient2).

A #pcap of the infection traffc, along with the associated #malware and artifacts are available at https://www.malware-traffic-analysis.net/2025/08/15/index.html

We've observed an interesting infection chain ⛓️ in the wild, starting with #LummaStealer spread through a fake gaming website and resulting in #Latrodectus and #SectopRat 🪲🔍👀

See below for more ⬇️

2025-07-15 (Tuesday): #LummaStealer infection with #SecTopRAT.

A #pcap of the #Lumma traffic and #SecTop #RAT activity, the #malware/artifacts from an infection, and the associated IOCs are available at https://www.malware-traffic-analysis.net/2025/07/15/index.html

Fake Zoom Ends in BlackSuit Ransomware

Key Takeaways The threat actor gained initial access by a fake Zoom installer that used d3f@ckloader and IDAT loader to drop SectopRAT. After nine days of dwell time, the SectopRAT malware dropped …

The DFIR Report

Enterprise networks were targeted in a campaign that involved SectopRAT and the deployment of BlackSuit ransomware via a trojanized Zoom installer.

🔗Read more: https://www.technadu.com/fake-zoom-installer-deploys-blacksuit-ransomware-in-enterprise-targeted-attack/582839/

#Ransomware #BlackSuit #SectopRAT #Zoom #Malware

Fake Zoom Installer Deploys BlackSuit Ransomware in Enterprise-Targeted Attack

Enterprise networks were targeted in a campaign that involved SectopRAT and the deployment of BlackSuit ransomware via a trojanized Zoom installer.

TechNadu
I Am Not A Robot

Since our last report, threat groups have refined ClickFix social engineering tactics. We analyse a new variant that presents as a Cloudflare turnstile challenge.

Been awhile since the last #ArechClient2 / #SectopRAT #malware #infrastructure update. Let's take a look:

A new cluster has formed in Germany using HETZNER-AS (24940):
/167.235.102.163
/144.76.163.55 on port 15648 instead of 15647 for comms
/144.76.163.20 as above

Back in early May a new IP, this time in North Holland was observed: /185.73.125.96 - XHOST-INTERNET-SOLUTIONS (208091). It remains active.

A number of new Russian IPs have been added with Prospero:
/91.215.85.23
/91.215.85.26

And Medialand:
/45.141.87.16
/45.141.87.218

A number of IPs previously tracked have either gone offline completely or have stopped serving the "EncryptionStatus" banner:

/194.26.135.180
/152.89.217.229
/176.111.174.142
/2.57.149.77
/185.161.248.159