• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    WinRAR, CVE-2025-8088, Nation-State Actors

    Nation-State Hackers, Cybercriminals Weaponize Patched WinRAR Flaw Despite Six-Month-Old Fix

    Proxy Network, Google, Google Threat Intelligence, Nation-State Actors,

    Google Dismantles Massive Proxy Network That Hid Espionage, Cybercrime for Nation-State Actors

    internal cybersecurity warning

    Acting CISA Chief Flagged for Uploading Sensitive Government Files Into ChatGPT

    Malicious Open Source Software Packages Neared 500,000 in 2025

    Malicious Open Source Software Packages Neared 500,000 in 2025

    Cyber Preparedness in Healthcare

    AHA Releases New Guides to Strengthen Hospital Emergency and Cyber Preparedness

    ATM jackpotting

    US Charges 87 in Major ATM Jackpotting Scheme Linked to Tren de Aragua

    CVE-2025-55182

    Hackers Exploit React2Shell Vulnerability to Deploy Miners and Botnets Worldwide

    cyberattack on Delta

    Major Cyberattack Cripples Russia’s Alarm and Vehicle Security Provider Delta

    CVE-2024-37079

    CISA Flags Actively Exploited VMware vCenter RCE Flaw in KEV Catalog

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Proxy Network, Google, Google Threat Intelligence, Nation-State Actors,

    Google Dismantles Massive Proxy Network That Hid Espionage, Cybercrime for Nation-State Actors

    Data Privacy Week 2026

    Canada Marks Data Privacy Week 2026 as Commissioner Pushes for Privacy by Design

    European Commission investigation into Grok AI

    European Commission Launches Fresh DSA Investigation Into X Over Grok AI Risks

    Phishing Toolkits, Vishing, Okta, Okta Threat Intelligence

    Phishing Kits Now Sync With Live Phone Scammers to Defeat Multifactor Authentication

    social media ban for children

    UK Turns to Australia Model as British Government Considers Social Media Ban for Children

    Grok AI Image Abuse

    Grok Image Abuse Prompts X to Roll Out New Safety Limits

    RedVDS, RedVDS Tool, RedVDS Infrastructure, Microsoft, Fraud, Scam

    Microsoft Crushes Cybercrime Subscription Service Behind $40 Million Fraud Spree

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    U.S. Senators Push Apple and Google to Review Grok AI

    After EU Probe, U.S. Senators Push Apple and Google to Review Grok AI

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    Black Friday

    Black Friday Cybersecurity Survival Guide: Protect Yourself from Scams & Attacks

    Cyble and BOCRA Sign MoU

    Cyble and BOCRA Sign MoU to Strengthen Botswana’s National Cybersecurity Framework

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    WinRAR, CVE-2025-8088, Nation-State Actors

    Nation-State Hackers, Cybercriminals Weaponize Patched WinRAR Flaw Despite Six-Month-Old Fix

    Proxy Network, Google, Google Threat Intelligence, Nation-State Actors,

    Google Dismantles Massive Proxy Network That Hid Espionage, Cybercrime for Nation-State Actors

    internal cybersecurity warning

    Acting CISA Chief Flagged for Uploading Sensitive Government Files Into ChatGPT

    Malicious Open Source Software Packages Neared 500,000 in 2025

    Malicious Open Source Software Packages Neared 500,000 in 2025

    Cyber Preparedness in Healthcare

    AHA Releases New Guides to Strengthen Hospital Emergency and Cyber Preparedness

    ATM jackpotting

    US Charges 87 in Major ATM Jackpotting Scheme Linked to Tren de Aragua

    CVE-2025-55182

    Hackers Exploit React2Shell Vulnerability to Deploy Miners and Botnets Worldwide

    cyberattack on Delta

    Major Cyberattack Cripples Russia’s Alarm and Vehicle Security Provider Delta

    CVE-2024-37079

    CISA Flags Actively Exploited VMware vCenter RCE Flaw in KEV Catalog

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Proxy Network, Google, Google Threat Intelligence, Nation-State Actors,

    Google Dismantles Massive Proxy Network That Hid Espionage, Cybercrime for Nation-State Actors

    Data Privacy Week 2026

    Canada Marks Data Privacy Week 2026 as Commissioner Pushes for Privacy by Design

    European Commission investigation into Grok AI

    European Commission Launches Fresh DSA Investigation Into X Over Grok AI Risks

    Phishing Toolkits, Vishing, Okta, Okta Threat Intelligence

    Phishing Kits Now Sync With Live Phone Scammers to Defeat Multifactor Authentication

    social media ban for children

    UK Turns to Australia Model as British Government Considers Social Media Ban for Children

    Grok AI Image Abuse

    Grok Image Abuse Prompts X to Roll Out New Safety Limits

    RedVDS, RedVDS Tool, RedVDS Infrastructure, Microsoft, Fraud, Scam

    Microsoft Crushes Cybercrime Subscription Service Behind $40 Million Fraud Spree

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    U.S. Senators Push Apple and Google to Review Grok AI

    After EU Probe, U.S. Senators Push Apple and Google to Review Grok AI

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    Black Friday

    Black Friday Cybersecurity Survival Guide: Protect Yourself from Scams & Attacks

    Cyble and BOCRA Sign MoU

    Cyble and BOCRA Sign MoU to Strengthen Botswana’s National Cybersecurity Framework

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Firewall Daily

Be Wary of Google Ads: Rhadamanthys Stealer is Here!

Many Google ads found to be linked to fake websites created by cybercriminals to spread infostealer Rhadamanthys

thecyberexpress by thecyberexpress
January 13, 2023
in Firewall Daily
0
Rhadamanthys
714
SHARES
4k
VIEWS
Share on LinkedInShare on Twitter

Cyble Research and Intelligence Labs detailed an information-stealing malware named Rhadamanthys that accesses several browsers and crypto wallets. It is spread on target systems via emails with downloads for apps including zoom.

However, it performs its malicious activities only if it detects the machine is not running in a controlled environment.

https://i0.wp.com/blog.cyble.com/wp-content/uploads/2023/01/Figure-13-Rhadamanthys-stealer-CC-panel.jpg?resize=1024%2C504&ssl=1

Rhadamanthys stealer C&C panel (Source: Cyble)

The Rhadamanthys stealer attack is initiated on Google Ads that take targets to phishing emails or phishing websites via redirects. The fake websites look legitimate and are of the following sites:

  • Zoom
  • AnyDesk
  • Notepad++
  • Bluestacks

The attacks using phishing emails, on the other hand, are sent with a PDF attachment titled Statement.pdf. The email body contains text that talks about the recent activity of the user and shows a link that they must click to verify what the email asks. It also asks for an ‘immediate response’ in most emails to force the user to use the malicious link that would initiate the Rhadamanthys stealer attack.

When an unsuspecting user downloads the attachment, it brings in the malware from a link such as https[:]\\zolotayavitrina[.]com/Jan-statement[.]exe as found by researchers from Cyble. The download is stored in the downloads folder.

report-ad-banner

Following this, a set of malicious downloads begins. An installer gets downloaded which also looks legitimate on the screen. The stealer malware gets downloaded.

The installer file gets executed which creates a folder called ST and saves it in the %temp% location. It drops two hidden binary executable files including Initialize 4.exe. The other loader is Runtime Broker.exe with SHA256: db66fc58c07ba0ccbe1b9c2db770179d0d931e5bf73838da9c915581661d4c1a. It is a 32-bit PyInstaller executable.

Runtime Broker.exe saves several Python-supporting files in the %temp% folder extracted from the PyInstaller executable including:

  • .pyc
  • .pyd
  • .dll

Raw obfuscated data is found in the Binary_Stub_Replacer.pyc which gets de-obfuscated by replace function and is converted into Binary and ASCII format.

https://i0.wp.com/blog.cyble.com/wp-content/uploads/2023/01/Figure-7-Decompiled-python-content-of-Binary_Stub_Replacer.pyc_.jpg?resize=1024%2C262&ssl=1

Python content of Binary_Stub_Replacer.pyc (Source: Cyble)

Following this, the second stage malicious python code is retrieved which has an embedded base64-encoded content of the shellcode. After executing the python code, the base64-encoded stub creates a new portable executable (PE) payload file.

This file gets injected into another Runtime Broker.exe process with the CreateThread() API function. The shellcode is a 32-bit executable file created using Microsoft visual C/C++ compiler.

https://i0.wp.com/blog.cyble.com/wp-content/uploads/2023/01/Figure-9-Payload-file-details.jpg?w=796&ssl=1

Payload file (Source: Cyble)

Criteria for Rhadamanthys stealer to run in the machine.

  1. The shellcode generates a mutex object to check if it has more copies of the malware in the infected device. It makes sure that there is only one at any time.
  2. To evade detection, the malware looks for the presence of a virtual environment and a controlled environment. If it results in a positive, it ceases its execution.
  3. It looks for strings associated with virtual machine environments to find if it is running on a virtual machine like VMware and VirtualBox.

https://i0.wp.com/blog.cyble.com/wp-content/uploads/2023/01/Figure-10-AntiVM-related-strings.jpg?w=654&ssl=1

AntiVM related strings (Source: Cyble)

When all the criteria are met, the shellcode drops a DLL file called nsis_unsibcfb0.dll in saves it in the %temp% folder. It gets launched using rundll32.exe which contains the code of the Rhadamanthys stealer. Researchers found traces leading to show that the developers used a steganography image that was downloaded from a remote server. It is suspected that the shellcode decrypted the steganography image to get the Rhadamanthys stealer payload.

Stealing activities of the Rhadamanthys stealer

At this stage, Rhadamanthys stealers activities kick in with it collecting system data including:

  1. Name of the computer
  2. Username
  3. RAM data
  4. CPU data
  5. OS version
  6. HWID
  7. Time zone of the system
  8. The set user and keyboard language

The data is collected by running a series of Windows management instrumentation (WMI) queries. After this, the browser directories are searched for accessing data from:

  1. Login data
  2. History
  3. Bookmarks
  4. Auto-fills
  5. Cookies

The malware has access to the following browsers:

  1. Brave
  2. Chrome
  3. CocCoc
  4. Edge
  5. Firefox
  6. Opera Software
  7. Pale Moon
  8. Sleipnir5

Although the Rhadamanthys stealer can steal data from several crypto wallets, it had specific functionality to access the following:

  1. Armory
  2. Binance
  3. Bitcoin
  4. Bytecoin
  5. Electron
  6. Qtum-Electrum
  7. Solar wallet
  8. WalletWasabi
  9. Zap
  10. Zecwallet Lite
  11. Zcash

The following image shows the crypto wallet browser extensions:

https://i0.wp.com/blog.cyble.com/wp-content/uploads/2023/01/Figure-12-Targeted-Crypto-wallets-with-extension-ID.jpg?resize=1024%2C913&ssl=1

(Source: Cyble)

Rhadamanthys stealer is capable of taking screenshots of the system data using the BitBlt() API function. It can steal from the following applications:

  1. FTP clients including CoreFTP and WinSCP
  2. Emails including GmailNotifierPro, Outlook, Foxmail, Thunderbird, and TrulyMail
  3. File managers including Total commanders
  4. Password managers including RoboForm and KeePass
  5. VPN including NordVPN, OpenVPN, ProtonVPN, and Windscribe VPN
  6. Messaging apps including Telegram, Discord, and Tox

Technical details of the Rhadamanthys stealer

Researchers found the following phishing domains:

  1. bluestacks-install[.]com
  2. zoomus-install[.]com
  3. install-zoom[.]com
  4. install-anydesk[.]com
  5. install-anydeslk[.]com
  6. zoom-meetings-install[.]com
  7. zoom-meetings-download[.]com
  8. anydleslk-download[.]com
  9. zoomvideo-install[.]com
  10. zoom-video-install[.]com
  11. istaller-zoom[.]com
  12. hasankahrimanoglu[.]com[.]tr

To defend against the presently active Rhadamanthys stealer and several similar malware that are sold under the Malware as a Service (MaaS) model, researchers ask users to install security products that detect phishing emails and websites. It is critical that pirated software from sources including Warez/ Torrent is avoided.

Cyble also noted that the ‘Hack Tool’ on sites such as YouTube contains malware. They maintained that data exfiltration can be blocked by monitoring the beacon on the network level.

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • More
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: cyber express newsGoogleAdsRhadamanthys stealerThe Cyber Express
Previous Post

LeakBase Leaks Purecars Data on the Hacker’s Forum

Next Post

ALPHV/BlackCat Ransomware Lists Air Comm, Fu Yu as Victims

Next Post
BlackCat Ransomware

ALPHV/BlackCat Ransomware Lists Air Comm, Fu Yu as Victims

Threat Landscape Reports 2025

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

WinRAR, CVE-2025-8088, Nation-State Actors
Vulnerabilities

Nation-State Hackers, Cybercriminals Weaponize Patched WinRAR Flaw Despite Six-Month-Old Fix

January 29, 2026
Bumble
Cyber News

Bumble, Panera Bread, Match Group, and CrunchBase Hit by New Wave of Cyberattacks

January 29, 2026
Proxy Network, Google, Google Threat Intelligence, Nation-State Actors,
Espionage

Google Dismantles Massive Proxy Network That Hid Espionage, Cybercrime for Nation-State Actors

January 29, 2026
internal cybersecurity warning
Firewall Daily

Acting CISA Chief Flagged for Uploading Sensitive Government Files Into ChatGPT

January 29, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information