Fake Copyright Claims Used to Spread AI-Enhanced Rhadamanthys Malware

Curated by THEOUTPOST

On Sat, 9 Nov, 12:01 AM UTC

2 Sources

Share

Cybercriminals are leveraging fake copyright infringement notices to distribute the latest version of Rhadamanthys Stealer malware, utilizing AI capabilities for more efficient attacks.

Sophisticated Phishing Campaign Targets Global Organizations

A new phishing campaign dubbed CopyRh(ight)adamanthys has been uncovered, targeting organizations worldwide with fake copyright infringement claims. The campaign, active since July, aims to spread the latest version of the Rhadamanthys Stealer malware 1.

Impersonation and AI-Enhanced Tactics

Cybercriminals are impersonating entertainment, media, and tech firms, which account for 70% of the spoofed organizations. The attackers use dedicated Gmail accounts and leverage AI capabilities to create convincing phishing emails and automate their attacks 1.

Rhadamanthys Stealer: An Evolving Threat

The latest version of Rhadamanthys (0.7) claims to have advanced AI-driven features. However, researchers at Check Point Software have found that it primarily uses older machine learning techniques, particularly in optical character recognition (OCR) 2.

Infection Process and Malware Capabilities

The phishing emails contain a password-protected ZIP archive with a decoy PDF, an executable, and a DLL. When executed, the malware is unpacked and deployed, capable of stealing sensitive information including:

  1. Login credentials
  2. Browser data
  3. Cryptocurrency wallet details
  4. Keystrokes 1 2

Global Reach and Targeted Countries

The campaign has a wide reach, targeting organizations across multiple continents. Countries affected include the US, Israel, South Korea, Peru, Thailand, Spain, Switzerland, and Poland 2.

Motivations and Attribution

Despite initial suspicions of state-sponsored activity, the indiscriminate targeting and financially motivated tactics suggest that lower-level criminals are behind the campaign. The attackers aim to profit either by directly siphoning funds from cryptocurrency wallets or by selling stolen credentials 2.

Implications for Cybersecurity

Sergey Shykevich, threat intelligence group manager at Check Point Software, emphasized the need for security leaders to prioritize automation and AI in defense strategies to counteract these globally scaled, financially motivated phishing campaigns 2.

As the threat landscape continues to evolve, organizations must remain vigilant and adapt their security measures to combat increasingly sophisticated attacks that leverage AI and automation techniques.

Continue Reading
Fake AI Image Generator Scam Spreads Malware, Targeting

Fake AI Image Generator Scam Spreads Malware, Targeting Content Creators and Businesses

A sophisticated malware campaign using a fake AI image and video generator called EditProAI is targeting Windows and Mac users, stealing sensitive data and posing a significant threat to content creators and businesses adopting AI tools.

Tom's Guide logoPC Magazine logoPYMNTS.com logo

3 Sources

Tom's Guide logoPC Magazine logoPYMNTS.com logo

3 Sources

AI-Powered Crypto Scam Targets Web3 Workers with Fake

AI-Powered Crypto Scam Targets Web3 Workers with Fake Meeting Apps

A sophisticated scam using AI-generated content and fake meeting apps is targeting Web3 workers to steal crypto wallets and sensitive information. The scheme involves social engineering and malware distribution.

Cointelegraph logoTom's Guide logo

2 Sources

Cointelegraph logoTom's Guide logo

2 Sources

Russian Hacking Group FIN7 Exploits AI Nude Generator Trend

Russian Hacking Group FIN7 Exploits AI Nude Generator Trend to Spread Malware

The notorious Russian hacking group FIN7 has launched a network of fake AI-powered deepnude generator sites to infect visitors with information-stealing malware, exploiting the growing interest in AI-generated content.

Decrypt logoPC Magazine logoFuturism logoBleeping Computer logo

5 Sources

Decrypt logoPC Magazine logoFuturism logoBleeping Computer logo

5 Sources

AI-Powered Gamma Platform Exploited in Sophisticated

AI-Powered Gamma Platform Exploited in Sophisticated Phishing Attack Targeting Microsoft SharePoint Users

Cybercriminals are leveraging Gamma, an AI-based presentation tool, to create convincing phishing campaigns that mimic Microsoft SharePoint login pages, highlighting the evolving tactics of threat actors in exploiting emerging technologies.

The Hacker News logoTechRadar logo

2 Sources

The Hacker News logoTechRadar logo

2 Sources

OpenAI Impersonation Phishing Attack Targets Businesses

OpenAI Impersonation Phishing Attack Targets Businesses Globally

Barracuda researchers uncover a large-scale phishing campaign impersonating OpenAI, highlighting the growing intersection of AI and cybersecurity threats.

DIGITAL TERMINAL logoCXOToday.com logoTechRadar logo

3 Sources

DIGITAL TERMINAL logoCXOToday.com logoTechRadar logo

3 Sources

TheOutpost.ai

Your one-stop AI hub

The Outpost is a comprehensive collection of curated artificial intelligence software tools that cater to the needs of small business owners, bloggers, artists, musicians, entrepreneurs, marketers, writers, and researchers.

© 2025 TheOutpost.AI All rights reserved