New Chaos RAT Variants Exploiting Windows and Linux Systems to Exfiltrate Sensitive Data

New variants of the infamous Chaos RAT, originally launched as an open-source remote administration toolkit in 2022, have been uncovered in a campaign targeting both Windows and Linux systems.

The evolution from an open-source utility into a sophisticated cross-platform malware has drawn significant attention from security researchers, notably the Acronis Threat Research Unit and analysts at PolySwarm.

These new iterations leverage advanced infection chains, obfuscation techniques, and anti-analysis measures that make them a formidable threat to organizations and individual users alike.

Multi-Platform Capabilities

Chaos RAT’s latest campaign centers on extensive phishing efforts. Attackers distribute convincing phishing emails that entice recipients to open malicious PDF attachments.

Once interacted with, these attachments prompt users to follow embedded links triggering a multi-stage malware delivery process.

Windows users are first exposed to a malicious JavaScript file, which retrieves a compressed ZIP file with an embedded BAT script.

This script then downloads and executes the final Chaos RAT payload, stealthily establishing persistence via scheduled tasks and strategic registry alterations.

On Linux systems, adversaries disguise the malware as legitimate network diagnostic tools such as “NetworkCheck” misleading users and security controls alike.

Here, shell scripts are used to fetch and activate the RAT client, with the entire process shrouded in obfuscated URLs and encrypted payloads to bypass conventional detection measures.

Persistent Threats

The technical prowess of Chaos RAT is evident in its layered delivery mechanisms and its arsenal of anti-analysis features.

Researchers observe heavy use of string encoding, dynamic API resolution, and virtualization detection.

These techniques severely complicate reverse engineering efforts and enable the malware to execute only in suitable, non-sandboxed environments.

Once established, Chaos RAT grants attackers a potent blend of capabilities: keylogging, remote shell access, screen capture, data exfiltration, and the deployment of cryptomining software.

Not only does this enable direct theft of sensitive information, but it also turns compromised machines into revenue sources for criminals through illicit cryptocurrency mining.

This new wave of Chaos RAT does not appear to focus on any specific industry or geographic location, underscoring its broad appeal and versatility as a commodity malware.

The dual targeting of Windows and Linux environments significantly broadens the potential attack surface, threatening organizations with heterogeneous infrastructure and individuals across multiple platforms.

According to the Report, The open-source origin of Chaos RAT has fostered an environment where threat actors can quickly iterate and enhance the malware, adding new features and refining evasion tactics almost as quickly as defenses can adapt.

Security experts highlight the persistent nature of the threat: Chaos RAT’s multi-platform functionality, rapid evolution, and integration of robust anti-detection measures make it a continuing hazard in the cybersecurity landscape.

As phishing continues to be an effective delivery vector, user education and advanced email scanning remain critical.

Indicators of Compromise (IOCs)

Hash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Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here