Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    BTC YTD performance from 2 to sleep but 308,709x more returns since 2011

    August 10, 2025

    60 malicious ruby gems download 275,000 times stolen credibility

    August 10, 2025

    Asus Vivobook S16 Refresh in India with Snapdragon X Series Processor: Price, Specification

    August 10, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Rainmware gangs use fast skitnet post exploitation malware
    Security

    Rainmware gangs use fast skitnet post exploitation malware

    PineapplesUpdateBy PineapplesUpdateMay 17, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Rainmware gangs use fast skitnet post exploitation malware
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Rainmware gangs use fast skitnet post exploitation malware

    Members of the ransomware gang rapidly use a new malware, called skitnets (“bossnets”), which is quietly for exploitation activities on a violated network.

    Since April 2024, malware has been offered for sale on underground forums like ramps, but accordingly Proudft researcherIt began to receive significant traction between the ransomware gang from the beginning of 2025.

    Prodaft told Bleepingcomputer that he has observed several ranges and searches deploying skitnets in real -world attacks, including Microsoft teams Blackbasta, fishing attacks and cactus against the enterprise.

    Malware was promoted to underground forums
    Malware was promoted to underground forums
    Source: Prodaft

    Sneak and powerful back door

    Skitnet infection begins with a rust-based loader and is executed on the target system, which decipses a Chacha20 encrypted Nim Binary and loads it in memory.

    The NIM payloads install DNS-based reverse shell for communication with the command and control (C2) server, which starts the session with random DNS query.

    Malware starts three threads, to send a heartbeat DNS requests, monitoring one and exfiltrate the shell output, and to listen to the command from a DNS reactions.

    Command and command executed commands are sent via HTTP or DNS, based on the command issued through the Skitnet C2 control room. The C2 panel allows the operator to release commands for the IP, location, position and execution of the target.

    Skitnet's administrator panel
    Skitnet’s administrator panel
    Source: Prodaft

    Supported commands are:

    • start up – By downloading three files (including a malicious DLL) in the Startup folder, and by making a shortcut for a valid asus executable (isp.exe) establishes firmness. It triggers a DLL hijack that executes a Powershell script (PAS.PS1) for the ongoing C2 communication.
    • Screen – Capture a screenshot of the victim’s desktop using Powershell, uploads it to the imgur, and the image sends the URL back to the C2 server.
    • Anydesk – Download and quietly install a legitimate remote access tool, annedek, hiding the window and notification tray icon.
    • Rutsver -Download and quietly establishes another valid remote access tool.
    • shell – Starts a Powershell command loop. An initial “Shell Start ..” sends the message, then repeatedly gives the server to the poll (? M) server every 5 seconds for the new command that executes using an invocation-exhibition, and sends back the result.
    • AV – Enumerates Qureed WMI and installed antivirus and safety software (select * from antivirusproduct in root \ Securityceenter2 Namespace). C2 sends results to the server.

    In addition to the core command set, operators can avail a different capacity that includes a .NET loader, which allows them to execute the powerrashel script in memory, and for adaptation of even deep attacks.

    Skitnet's .NET loader
    Skitnet’s .NET loader
    Source: Prodaft

    Although ransomware groups often use custom tools to suit specific operations and detect less AV, they are expensive to develop skilled developers and require which are not always available, especially in low-level groups.

    Using an off-the-chest malware such as skitnets is cheap, sharp to deploy, and can make the atribution hard, as many danger actors use it.

    In the ransomware space, there is space for both approaches, even a mixture of both, but the capabilities of the skitnet make it particularly seductive to the hackers.

    Prodaft has published indicators of agreement associated with Skitnet (IOCS) Jethb repository,


    Red Report 2025

    Based on the analysis of 14M malicious tasks, search for the top 10 MITERAT & CK techniques behind the 93% attacks and how to defend them against them.

    exploitation fast gangs Malware post Rainmware skitnet
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous Article10 1980 cartoon classics are available for streaming
    Next Article I spent my first few hours with RTX 5060 playing doom: The Dark Age, and it looks very clever under $ 300
    PineapplesUpdate
    • Website

    Related Posts

    Security

    60 malicious ruby gems download 275,000 times stolen credibility

    August 10, 2025
    Security

    Google Data Brech confirms potential Google advertising customers information

    August 9, 2025
    Security

    Durch Datenlecks Verurachte Kosten Sind Gefallen

    August 9, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    BTC YTD performance from 2 to sleep but 308,709x more returns since 2011

    August 10, 2025

    60 malicious ruby gems download 275,000 times stolen credibility

    August 10, 2025

    Asus Vivobook S16 Refresh in India with Snapdragon X Series Processor: Price, Specification

    August 10, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.