Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

Location-Based Gaming NFTs: How GPS and Blockchain Are Changing the Way We Play

May 2, 2026

ZachXBT Exposes US Law Firm Gerstein Harrow’s $71M Grab of Stolen Lazarus Funds

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»Accounting Firm Targeted by Malware Campaign Using New Crypter
Accounting Firm Targeted by Malware Campaign Using New Crypter
Security

Accounting Firm Targeted by Malware Campaign Using New Crypter

February 11, 2026No Comments3 Mins Read

A cyber-attack on a US-based accounting firm in May 2025 has been observed delivering the PureRAT remote access Trojan using a sophisticated crypter called Ghost Crypt.

According to researchers at eSentire’s Threat Response Unit (TRU), the campaign involved social engineering, advanced obfuscation techniques and a multi-stage malware delivery process.

PureRAT Delivered Through Ghost Crypt and Social Engineering

The attacker, posing as a new client, sent a malicious PDF linking to a Zoho WorkDrive folder. The folder contained a ZIP archive disguised as tax documentation. Inside was a file with a deceptive double extension (.pdf.exe) and a renamed DLL. When executed, the bundled crypter decrypted and injected PureRAT into the legitimate Windows binary csc.exe.

Ghost Crypt, advertised on Hackforums since April 2025, claims to bypass major antivirus solutions and supports the sideloading of both EXE and DLL files. It uses a custom variant of the ChaCha20 algorithm and employs an injection method called “Process Hypnosis” to deliver payloads undetected.

The attacker further ensured persistence by adding a registry key entry and copying the DLL to the user’s documents folder.

Ghost Crypt Features and Malware Behavior

Ghost Crypt promotes several features:

  • Bypasses Windows Defender and cloud-based detection

  • Compatible with Windows 11 24H2+

  • Includes customizable icons and DLL stub sizing

  • Offers a 3-day survival guarantee with free recrypts

  • Supports malware families like LummaC2, Rhadmanthys, and XWorm

Read more on Windows malware injection techniques: Winos4.0 Malware Found in Game Apps, Targets Windows Users

The attack used legitimate software – hpreader.exe by Haihaisoft – for DLL sideloading. This, eSentire warned, highlights the challenge of distinguishing benign tools from malicious loaders.

The injected PureRAT payload communicates with command-and control (C2) servers, collecting user data, system details and searching for crypto wallets and desktop apps like Ledger Live and Exodus.

See also  Byakugan Infostealer Capabilities Revealed - Infosecurity Magazine

PureRAT Evolves as Main Offering from PureCoder

PureRAT has replaced PureHVNC as the flagship product from underground seller PureCoder.

The malware is packed using .NET obfuscators and compressed with encryption layers including AES-256 and GZIP. It loads DLLs using direct memory injection instead of traditional execution techniques.

Upon successful installation, the malware scans browsers for crypto wallet extensions and uses SetThreadExecutionState API calls to prevent the system from entering sleep mode. It then transmits collected data and awaits further instructions from its operators.

eSentire warned organizations to remain vigilant against urgent requests from unknown sources, particularly involving cloud storage links. They also advised enabling file extension visibility, using EDR tools and verifying the legitimacy of unexpected communications.

Source link

Accounting Campaign Crypter firm Malware Targeted

Related Posts

ZachXBT Exposes US Law Firm Gerstein Harrow’s $71M Grab of Stolen Lazarus Funds

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026

What does Lido’s targeted rsETH fix mean for LDO and EarnETH holders?

May 2, 2026
Top Posts

BlockDAG (BDAG) Missed Four Launch Deadlines or Taurox (TAUX): Why Early Buyers Target 100x Returns

March 22, 2026

Ethereum co-founder Vitalik Buterin refutes asset dumping claims

October 18, 2023

Crypto Custody Firm Ledger Cuts 12% of Staff

October 8, 2023

Type above and press Enter to search. Press Esc to cancel.