Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms
好的,我现在需要帮用户总结一篇文章,控制在100字以内。首先,我得仔细阅读文章内容,抓住主要信息。 文章主要讲的是网络安全威胁,特别是针对Windows的远程访问木马(RAT)。攻击者通过游戏工具分发恶意软件,利用Java和PowerShell执行恶意代码。攻击链设计了多种手段来逃避检测,比如删除初始下载器和配置微软 Defender 的例外。持久性机制包括计划任务和启动脚本。 此外,文章还提到了新的RAT家族Steaelite,它结合了数据窃取和勒索软件功能,并且具备完全不可检测的能力。攻击者可以通过单一控制面板进行多种恶意活动,如远程代码执行、 credential theft等。 最后,用户被建议采取一些防御措施,比如审计 Defender 的例外、删除恶意任务等。还有其他新的RAT家族被发现。 总结时要涵盖攻击手段、逃避检测的方法、持久性机制、新RAT的特点以及防御建议。控制在100字以内,直接描述内容。 </think> 网络威胁分子通过分发伪装成游戏工具的远程访问木马(RAT),利用Java和PowerShell执行恶意代码,并通过删除初始下载器和配置微软 Defender 例外来规避检测。持久性机制包括计划任务和启动脚本。新型 RAT Steaelite 结合数据窃取和勒索功能,并支持多种恶意操作。防御建议包括审计 Defender 例外、删除恶意任务等。 2026-2-27 10:6:0 Author: thehackernews.com(查看原文) 阅读量:4 收藏

Endpoint Security / Windows Security

Threat actors are luring unsuspecting users into running trojanized gaming utilities that are distributed via browsers and chat platforms to distribute a remote access trojan (RAT).

"A malicious downloader staged a portable Java runtime and executed a malicious Java archive (JAR) file named jd-gui.jar," the Microsoft Threat Intelligence team said in a post on X. "This downloader used PowerShell and living-off-the-land binaries (LOLBins) like cmstp.exe for stealthy execution."

The attack chain is also designed to evade detection by deleting the initial downloader and by configuring Microsoft Defender exclusions for the RAT components.

Persistence is achieved by means of a scheduled task and Windows startup script named "world.vbs," before the final payload is deployed on the compromised host. The malware, per Microsoft, is a "multi-purpose malware" that acts as a loader, runner, downloader, and RAT.

Once launched, it connects to an external server at "79.110.49[.]15" for command-and-control (C2) communications, allowing it to exfiltrate data and deploy additional payloads.

As ways to defend against the threat, users are advised to audit Microsoft Defender exclusions and scheduled tasks, remove malicious tasks and startup scripts, isolate affected endpoints, and reset credentials for users active on compromised hosts.

The disclosure comes as BlackFog disclosed details of a new Windows RAT malware family called Steaelite that was first advertised on criminal forums in November 2025 as a "best Windows RAT" with "fully undetectable" (FUD) capabilities. It's compatible with both Windows 10 and 11.

Unlike other off-the-shelf RATs sold to criminal actors, Steaelite bundles together data theft and ransomware, packaging them into one web panel, with an Android ransomware module on the way. The panel also incorporates various developer tools to facilitate keylogging, client-to-victim chat, file searching, USB spreading, wallpaper modification, UAC bypass, and clipper functionality

Other notable features include removing competing malware, disabling Microsoft Defender, or configuring exclusions, and installing persistence methods.

As for its main capabilities, Steaelite RAT supports remote code execution, file management, live streaming, webcam and microphone access, process management, clipboard monitoring, password theft, installed program enumeration, location tracking, arbitrary file execution, URL opening, DDoS attacks, and VB.NET payload compilation.

"The tool gives operators browser-based control over infected Windows machines, covering remote code execution, credential theft, live surveillance, file exfiltration, and ransomware deployment from a single dashboard," security researcher Wendy McCague said.

"A single threat actor can browse files, exfiltrate documents, harvest credentials, and deploy ransomware from the same dashboard. This enables complete double extortion from one tool."

In recent weeks, threat hunters have also discovered two new RAT families tracked as DesckVB RAT and KazakRAT that enable comprehensive remote control over infected hosts and even selectively deploy capabilities post-compromise. According to Ctrl Alt Intel, KazakRAT is suspected to be the work of a suspected state-affiliated cluster targeting Kazakh and Afghan entities as part of a persistent campaign ongoing since at least August 2022.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/trojanized-gaming-tools-spread-java.html
如有侵权请联系:admin#unsafe.sh