newstrooper newstrooper
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
Reading: Chaos Rat Malware Targets Window and Linux via fake network tools download
Share

News Trooper

Your Global Insight, Delivered Daily.

Search
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
Follow US
© 2025 All Rights Reserved | Powered by News Trooper News
News Trooper > Technology > Chaos Rat Malware Targets Window and Linux via fake network tools download
Technology

Chaos Rat Malware Targets Window and Linux via fake network tools download

June 4, 2025 5 Min Read
Share
Chaos Rat Malware Targets Window and Linux via fake network tools download
SHARE

Threat Hunter is bringing attention to a new variant of the remote access Trojan horse (rat) Chaos Rat It has been used in recent attacks targeting Windows and Linux systems.

According to Acronis research findings, malware artifacts may have been distributed by trinking victims to download network troubleshooting utility in Linux environments.

“Chaos Rat is an open source rat written in Golang and provides cross-platform support for both Windows and Linux systems,” security researchers Santiago Pontiroli, Gabor Molnar and Kirill Antonenko said in a report shared with Hacker News.

“Inspired by popular frameworks like Cobalt Strike and Sliver, Chaos Rat offers an admin panel that lets users build payloads, establish sessions and control compromised machines.”

Work on the “Remote Management Tool” began in 2017, but it didn’t attract attention until December 2022, when it was used in malicious campaigns targeting public web applications hosted on Linux Systems using XMRIG Cryptocurrency Miner.

Once the installation is installed, the malware will connect to an external server, launch a reverse shell, upload/download/delete files and deletions, enumerate files and directories, take screenshots, gather system information, lock/restart/shutdown the machine, and wait for commands that can open any URL. The latest version of Chaos Rat is 5.0.3 and was released on May 31, 2024.

Acronis said Linux variants of malware are often detected in the wild, in connection with cryptocurrency mining campaigns. The attack chain observed by the company indicates that chaos lats are distributed to victims via phishing emails containing malicious links or attachments.

These artifacts are designed to allow you to regularly retrieve malware as a way to set up persistence by dropping malicious scripts that can modify the task scheduler “/etc/crontab”.

Download fake network tools

“Early campaigns used this technique to provide cryptocurrency miners and chaos rats individually, indicating that chaos was primarily adopted for reconnaissance and intelligence gathering on compromised devices,” the researchers said.

See also  Researchers detail the evolving tactics of bitter apt as its geographical extent expands

An analysis of a recent sample uploaded from India to Virustotal in January 2025 from India named “NetworkAnalyzer.tar.gz” has increased the likelihood that users are being deceived by malware downloads by masquerading as a network troubleshooting in Linux environments.

Furthermore, admin panels that allow users to build payloads to manage infected machines are known to be susceptible to command injection vulnerabilities (CVE-2024-30850, CVSS score: 8.8) that can be combined with cross-site scripting flaws (CVE-2024-31839, CVSS score: 4.8). Both vulnerabilities have since been addressed by Chaos Rat maintainers as of May 2024.

While it is not clear who is behind the use of chaos lats in real-world attacks at present, this development once again shows how threat actors can weaponize open source tools in their advantage and continue to disrupt attribution efforts.

“What starts as a developer’s tool can quickly become a means of selecting threat actors,” the researchers said. “With publicly available malware, APT groups blend into the noise of everyday cybercrime. Open source malware offers a ‘sufficient’ toolkit that can be customized and deployed quickly. When multiple actors use the same open source malware, the water of attribution becomes confusing. ”

This disclosure coincides with the emergence of new campaigns targeting Trust Wallet users on desktops via a bundle of software intended to target Trust Wallet users on desktops, via down-download links, phishing emails, or browser entitlements, extract data from desktop-based wallets, extract from browser extensions, execute instructions, and act as clipper malware.

“When installed, malware can scan wallet files, intercept clipboard data, and monitor browser sessions by capturing seed phrases and private keys,” Point Wild Researcher Kedar S Pandit said in a report published this week.

See also  Iran-linked blade ferine hits Iraqi and Kurdish targets with whispers and spear malware

Share This Article
Facebook Twitter Copy Link
Previous Article Democrats’ online problem: They’re not doing enough year-round Democrats’ online problem: They’re not doing enough year-round
Next Article Research says AI behaves differently when it is known to be tested. Research says AI behaves differently when it is known to be tested.
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular News

Musk’s decision to limit political spending leaves some Republicans cold

Musk’s decision to limit political spending leaves some Republicans cold

Elon Musk's pledge to retreat from campaign spending -- if…

June 2, 2025
GOP Rep. Bill Huizenga is preparing to run for Michigan's open Senate seat

GOP Rep. Bill Huizenga is preparing to run for Michigan's open Senate seat

McKinnack Island, Mich. -- Republican Rep. Bill Huizenga is preparing…

June 2, 2025
'It betrays our values': Progressives grapple with deadly shooting

'It betrays our values': Progressives grapple with deadly shooting

Progressive is tackling that two people who worked at the…

June 2, 2025
Beshear, Khanna to headline Dem mayor summit in July

Beshear, Khanna to headline Dem mayor summit in July

Two potential 2028 presidential primary candidates will descend on Cleveland…

June 2, 2025
Democrats are ‘stuck in that unfortunate reality’ in debate over Biden's illness

Democrats are ‘stuck in that unfortunate reality’ in debate over Biden's illness

24 hours after Sunday's announcement that former President Joe Biden…

June 2, 2025

You Might Also Like

Can you really trust AI thinking reasoning?
Technology

Can you really trust AI thinking reasoning?

8 Min Read
Voxel51’s new automatic labeling technology promises to reduce annotation costs by 100,000 times
Technology

Voxel51’s new automatic labeling technology promises to reduce annotation costs by 100,000 times

7 Min Read
How AI agents are transforming the education sector: See Kira Learning and Beyond
Technology

How AI agents are transforming the education sector: See Kira Learning and Beyond

11 Min Read
HPE issues a security patch for StoreOnce bugs that allow remote authentication bypass
Technology

HPE issues a security patch for StoreOnce bugs that allow remote authentication bypass

2 Min Read
newstrooper
newstrooper

Welcome to News Trooper, your reliable destination for global news that matters. In an age of information overload, we stand as a dedicated news platform committed to delivering timely, accurate, and insightful coverage of the world’s most significant events and trends.

  • Business
  • Entertainment
  • Gaming
  • Politics
  • Sports
  • Technology
  • Travel
  • World News
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2025 All Rights Reserved | Powered by News Trooper News

Welcome Back!

Sign in to your account

Lost your password?