New Chaos RAT Variants Targeting Windows and Linux Systems to Steal Sensitive Data

New Chaos RAT Variants Targeting Windows and Linux Systems to Steal Sensitive Data

The Acronis Threat Research Unit has identified new variants of Chaos RAT, a remote administration tool (RAT) that has evolved from an open-source project first observed in 2022 into a formidable multi-platform malware.

These latest iterations of Chaos RAT are now targeting both Windows and Linux systems, showcasing an alarming level of sophistication through phishing-driven infection chains and advanced evasion techniques.

A Sophisticated Evolution of an Open-Source Threat

Written primarily in C++, this malware is being leveraged by threat actors to deploy cryptominers, steal sensitive data, and establish persistent control over compromised devices, posing a severe risk to organizations and individuals across diverse industries.

– Advertisement –

Chaos RAT spreads predominantly through phishing campaigns, utilizing malicious PDF attachments embedded in emails to lure unsuspecting users into initiating the infection process.

On Windows systems, clicking embedded links in these PDFs triggers the download of a JavaScript file, which subsequently retrieves a ZIP archive containing a BAT script.

This script executes a sequence of commands to download and deploy the final Chaos RAT payload, ensuring persistence through scheduled tasks and registry modifications.

Multi-Stage Infection

On Linux platforms, the malware disguises itself as a legitimate network diagnostic tool, often named “NetworkCheck,” using shell scripts to fetch and execute the RAT from obfuscated URLs with encrypted payloads, evading traditional security controls.

The technical prowess of Chaos RAT is further highlighted by its multi-stage delivery mechanism and robust anti-analysis techniques, including encoded strings, dynamic API resolution, and checks for virtualized environments or sandboxes to prevent detection and reverse engineering.

Once deployed, Chaos RAT grants attackers extensive control over infected systems, enabling capabilities such as keylogging, screen capture, file exfiltration, and remote command execution.

Additionally, it installs cryptocurrency mining modules that exploit system resources for illicit profit, severely impacting device performance.

The dual-platform targeting broadens its attack surface, making it a versatile threat capable of affecting a wide range of environments.

According to PolySwarm analysts Report, the open-source nature of Chaos RAT has fueled rapid iterations by threat actors, who continue to enhance its feature set and evasion tactics, positioning it as an evolving and persistent danger in the cybersecurity landscape.

While specific targeted regions or industries remain undisclosed, the malware’s adaptability underscores the urgent need for robust defense mechanisms and heightened user awareness to mitigate its impact.

Indicators of Compromise (IOCs)

Below is a table of known IOCs associated with Chaos RAT samples provided by PolySwarm for reference in threat detection and mitigation efforts:

SHA256 Hash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Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates


Source link