Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Rainmware gangs use fast skitnet post exploitation malware
    Security

    Rainmware gangs use fast skitnet post exploitation malware

    PineapplesUpdateBy PineapplesUpdateMay 17, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Rainmware gangs use fast skitnet post exploitation malware
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Rainmware gangs use fast skitnet post exploitation malware

    Members of the ransomware gang rapidly use a new malware, called skitnets (“bossnets”), which is quietly for exploitation activities on a violated network.

    Since April 2024, malware has been offered for sale on underground forums like ramps, but accordingly Proudft researcherIt began to receive significant traction between the ransomware gang from the beginning of 2025.

    Prodaft told Bleepingcomputer that he has observed several ranges and searches deploying skitnets in real -world attacks, including Microsoft teams Blackbasta, fishing attacks and cactus against the enterprise.

    Malware was promoted to underground forums
    Malware was promoted to underground forums
    Source: Prodaft

    Sneak and powerful back door

    Skitnet infection begins with a rust-based loader and is executed on the target system, which decipses a Chacha20 encrypted Nim Binary and loads it in memory.

    The NIM payloads install DNS-based reverse shell for communication with the command and control (C2) server, which starts the session with random DNS query.

    Malware starts three threads, to send a heartbeat DNS requests, monitoring one and exfiltrate the shell output, and to listen to the command from a DNS reactions.

    Command and command executed commands are sent via HTTP or DNS, based on the command issued through the Skitnet C2 control room. The C2 panel allows the operator to release commands for the IP, location, position and execution of the target.

    Skitnet's administrator panel
    Skitnet’s administrator panel
    Source: Prodaft

    Supported commands are:

    • start up – By downloading three files (including a malicious DLL) in the Startup folder, and by making a shortcut for a valid asus executable (isp.exe) establishes firmness. It triggers a DLL hijack that executes a Powershell script (PAS.PS1) for the ongoing C2 communication.
    • Screen – Capture a screenshot of the victim’s desktop using Powershell, uploads it to the imgur, and the image sends the URL back to the C2 server.
    • Anydesk – Download and quietly install a legitimate remote access tool, annedek, hiding the window and notification tray icon.
    • Rutsver -Download and quietly establishes another valid remote access tool.
    • shell – Starts a Powershell command loop. An initial “Shell Start ..” sends the message, then repeatedly gives the server to the poll (? M) server every 5 seconds for the new command that executes using an invocation-exhibition, and sends back the result.
    • AV – Enumerates Qureed WMI and installed antivirus and safety software (select * from antivirusproduct in root \ Securityceenter2 Namespace). C2 sends results to the server.

    In addition to the core command set, operators can avail a different capacity that includes a .NET loader, which allows them to execute the powerrashel script in memory, and for adaptation of even deep attacks.

    Skitnet's .NET loader
    Skitnet’s .NET loader
    Source: Prodaft

    Although ransomware groups often use custom tools to suit specific operations and detect less AV, they are expensive to develop skilled developers and require which are not always available, especially in low-level groups.

    Using an off-the-chest malware such as skitnets is cheap, sharp to deploy, and can make the atribution hard, as many danger actors use it.

    In the ransomware space, there is space for both approaches, even a mixture of both, but the capabilities of the skitnet make it particularly seductive to the hackers.

    Prodaft has published indicators of agreement associated with Skitnet (IOCS) Jethb repository,


    Red Report 2025

    Based on the analysis of 14M malicious tasks, search for the top 10 MITERAT & CK techniques behind the 93% attacks and how to defend them against them.

    exploitation fast gangs Malware post Rainmware skitnet
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous Article10 1980 cartoon classics are available for streaming
    Next Article I spent my first few hours with RTX 5060 playing doom: The Dark Age, and it looks very clever under $ 300
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    Free Webinar February 3: How to use press and PR to grow fast without a big budget

    January 14, 2026
    Startups

    Protein is fast food’s new secret weapon

    January 9, 2026
    Security

    Your Uber driver has a new endeavor: training an AI for cash

    October 18, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Google tests AI-operated audio overview in search results for some questions

    June 16, 20250 Views

    Yes, this was the original voice of the Garat in the trailer for the thief VR

    June 16, 20250 Views

    Best LC10 loadout in call of duty: Warzone

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.