Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI toolsNEW
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI toolsNEW
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Upcrypter malware targets Windows users via phishing

byEmre Çıtak
August 27, 2025
in Cybersecurity, News
Home News Cybersecurity
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

A global phishing attack is underway, targeting Windows users through deceptive emails containing UpCrypter malware. The attack, identified by cybersecurity researchers, aims to give hackers remote control over compromised systems worldwide.

Fortinet’s FortiGuard Labs has been actively tracking the UpCrypter activity. UpCrypter functions as a loader, designed to install various remote access tools (RATs). These tools enable malicious actors to maintain persistent access to infected machines, posing a significant threat to data security and system integrity.

The phishing emails are crafted to appear as legitimate notifications, often disguised as missed voicemails or purchase orders. Potential victims who interact with the attachments included in these emails are redirected to fraudulent websites. These websites are designed to mimic trusted platforms, frequently incorporating company logos to enhance credibility and deceive users into believing they are interacting with a legitimate entity.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

According to Fortinet, these deceptive web pages prompt users to download a ZIP file. This file contains a heavily obfuscated JavaScript dropper, which initiates the malware infection process. Upon execution, the JavaScript dropper triggers PowerShell commands in the background. These commands establish connections to attacker-controlled servers, facilitating the download and execution of subsequent stages of the malware.

Cara Lin, a Fortinet FortiGuard Labs researcher, stated, “These pages are designed to entice recipients into downloading JavaScript files that act as droppers for UpCrypter.” This highlights the deceptive nature of the attack and the importance of user vigilance in identifying and avoiding such threats.

Once executed, UpCrypter performs a system scan to identify the presence of sandbox environments or forensic tools. These environments are often used by security researchers to analyze malware behavior. If such tools are detected, UpCrypter attempts to thwart analysis by forcing a system reboot, disrupting the investigative process.

If no monitoring tools are detected, UpCrypter proceeds to download and execute additional malicious payloads. In some instances, the attackers employ steganography, concealing these payloads within seemingly innocuous images. This technique allows them to bypass antivirus software detection mechanisms, increasing the likelihood of successful infection.

The final stage of the attack involves the deployment of several malware variants, including:

  • PureHVNC: This tool grants attackers hidden remote desktop access to the compromised system, enabling them to perform unauthorized actions without the user’s knowledge.
  • DCRat (DarkCrystal RAT): A multi-functional remote access tool used for spying and data exfiltration. This RAT allows attackers to steal sensitive information and monitor user activity.
  • Babylon RAT: This RAT provides attackers with complete control over the infected device, allowing them to execute commands, access files, and perform other malicious activities.

Fortinet researchers have observed that the attackers utilize various methods to conceal their malicious code. These include string obfuscation, modification of registry settings for persistence, and in-memory code execution to minimize the footprint on the disk and evade detection.

The phishing campaign has been active since early August 2025 and exhibits a global reach. High volumes of activity have been observed in Austria, Belarus, Canada, Egypt, India, and Pakistan. The sectors most affected by this campaign include manufacturing, technology, healthcare, construction, and retail/hospitality. Data suggests the rapid proliferation of this threat, with detections doubling within a two-week period.

This attack is designed for long-term persistence, delivering a chain of malware that remains hidden within corporate systems. Fortinet advises, “Users and organizations should take this threat seriously, use strong email filters, and make sure staff are trained to recognize and avoid these types of attacks.”


Featured image credit

Tags: upcrypterWindows

Related Posts

Transforming credit underwriting with machine learning and alternative data

Transforming credit underwriting with machine learning and alternative data

December 17, 2025
Only 3000 units of Galaxy Z TriFold available in restock

Only 3000 units of Galaxy Z TriFold available in restock

December 17, 2025
Xiaomi 15 Ultra gets stable HyperOS 3 update

Xiaomi 15 Ultra gets stable HyperOS 3 update

December 17, 2025
Meta glasses now play Spotify songs based on what you see

Meta glasses now play Spotify songs based on what you see

December 17, 2025
Adobe releases Firefly video editor with prompt edits

Adobe releases Firefly video editor with prompt edits

December 17, 2025
Large language models for production data modeling

Large language models for production data modeling

December 17, 2025

LATEST NEWS

Transforming credit underwriting with machine learning and alternative data

Only 3000 units of Galaxy Z TriFold available in restock

Xiaomi 15 Ultra gets stable HyperOS 3 update

Meta glasses now play Spotify songs based on what you see

Adobe releases Firefly video editor with prompt edits

Large language models for production data modeling

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI tools
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.