Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

Bitcoin mining stocks climb in 2026 as BTC lags behind

May 3, 2026

Alex Lab hack reportedly hits SPD Bank clients after earlier $8.3M exploit

May 3, 2026

Bitcoin's 'hazardous' airdrop: Why developers are warning against Paul Sztorc’s eCash fork

May 3, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»Accounting Firm Targeted by Malware Campaign Using New Crypter
Accounting Firm Targeted by Malware Campaign Using New Crypter
Security

Accounting Firm Targeted by Malware Campaign Using New Crypter

February 11, 2026No Comments3 Mins Read

A cyber-attack on a US-based accounting firm in May 2025 has been observed delivering the PureRAT remote access Trojan using a sophisticated crypter called Ghost Crypt.

According to researchers at eSentire’s Threat Response Unit (TRU), the campaign involved social engineering, advanced obfuscation techniques and a multi-stage malware delivery process.

PureRAT Delivered Through Ghost Crypt and Social Engineering

The attacker, posing as a new client, sent a malicious PDF linking to a Zoho WorkDrive folder. The folder contained a ZIP archive disguised as tax documentation. Inside was a file with a deceptive double extension (.pdf.exe) and a renamed DLL. When executed, the bundled crypter decrypted and injected PureRAT into the legitimate Windows binary csc.exe.

Ghost Crypt, advertised on Hackforums since April 2025, claims to bypass major antivirus solutions and supports the sideloading of both EXE and DLL files. It uses a custom variant of the ChaCha20 algorithm and employs an injection method called “Process Hypnosis” to deliver payloads undetected.

The attacker further ensured persistence by adding a registry key entry and copying the DLL to the user’s documents folder.

Ghost Crypt Features and Malware Behavior

Ghost Crypt promotes several features:

  • Bypasses Windows Defender and cloud-based detection

  • Compatible with Windows 11 24H2+

  • Includes customizable icons and DLL stub sizing

  • Offers a 3-day survival guarantee with free recrypts

  • Supports malware families like LummaC2, Rhadmanthys, and XWorm

Read more on Windows malware injection techniques: Winos4.0 Malware Found in Game Apps, Targets Windows Users

The attack used legitimate software – hpreader.exe by Haihaisoft – for DLL sideloading. This, eSentire warned, highlights the challenge of distinguishing benign tools from malicious loaders.

The injected PureRAT payload communicates with command-and control (C2) servers, collecting user data, system details and searching for crypto wallets and desktop apps like Ledger Live and Exodus.

See also  SHIB Team Issues Crucial Warning to Shiba Inu Army

PureRAT Evolves as Main Offering from PureCoder

PureRAT has replaced PureHVNC as the flagship product from underground seller PureCoder.

The malware is packed using .NET obfuscators and compressed with encryption layers including AES-256 and GZIP. It loads DLLs using direct memory injection instead of traditional execution techniques.

Upon successful installation, the malware scans browsers for crypto wallet extensions and uses SetThreadExecutionState API calls to prevent the system from entering sleep mode. It then transmits collected data and awaits further instructions from its operators.

eSentire warned organizations to remain vigilant against urgent requests from unknown sources, particularly involving cloud storage links. They also advised enabling file extension visibility, using EDR tools and verifying the legitimacy of unexpected communications.

Source link

Accounting Campaign Crypter firm Malware Targeted

Related Posts

Alex Lab hack reportedly hits SPD Bank clients after earlier $8.3M exploit

May 3, 2026

How North Korean spies spent months in-person to drain $285 million from Drift

May 2, 2026

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026

ZachXBT Exposes US Law Firm Gerstein Harrow’s $71M Grab of Stolen Lazarus Funds

May 2, 2026
Top Posts

As Wall Street moves on-chain, DeFi faces a $330 billion trust test it can’t dodge

April 5, 2026

Sentora Launches Strategic RLUSD Lending Vault on Morpho, Expanding DeFi Stablecoin Utility

March 7, 2026

CoinsPaid sees humans as the ‘weakest link’ when it comes to emerging hacking threats

September 23, 2023

Type above and press Enter to search. Press Esc to cancel.