Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Upcrypter malware targets Windows users via phishing

byEmre Çıtak
August 27, 2025
in Cybersecurity, News
Home News Cybersecurity

A global phishing attack is underway, targeting Windows users through deceptive emails containing UpCrypter malware. The attack, identified by cybersecurity researchers, aims to give hackers remote control over compromised systems worldwide.

Fortinet’s FortiGuard Labs has been actively tracking the UpCrypter activity. UpCrypter functions as a loader, designed to install various remote access tools (RATs). These tools enable malicious actors to maintain persistent access to infected machines, posing a significant threat to data security and system integrity.

The phishing emails are crafted to appear as legitimate notifications, often disguised as missed voicemails or purchase orders. Potential victims who interact with the attachments included in these emails are redirected to fraudulent websites. These websites are designed to mimic trusted platforms, frequently incorporating company logos to enhance credibility and deceive users into believing they are interacting with a legitimate entity.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

According to Fortinet, these deceptive web pages prompt users to download a ZIP file. This file contains a heavily obfuscated JavaScript dropper, which initiates the malware infection process. Upon execution, the JavaScript dropper triggers PowerShell commands in the background. These commands establish connections to attacker-controlled servers, facilitating the download and execution of subsequent stages of the malware.

Cara Lin, a Fortinet FortiGuard Labs researcher, stated, “These pages are designed to entice recipients into downloading JavaScript files that act as droppers for UpCrypter.” This highlights the deceptive nature of the attack and the importance of user vigilance in identifying and avoiding such threats.

Once executed, UpCrypter performs a system scan to identify the presence of sandbox environments or forensic tools. These environments are often used by security researchers to analyze malware behavior. If such tools are detected, UpCrypter attempts to thwart analysis by forcing a system reboot, disrupting the investigative process.

If no monitoring tools are detected, UpCrypter proceeds to download and execute additional malicious payloads. In some instances, the attackers employ steganography, concealing these payloads within seemingly innocuous images. This technique allows them to bypass antivirus software detection mechanisms, increasing the likelihood of successful infection.

The final stage of the attack involves the deployment of several malware variants, including:

  • PureHVNC: This tool grants attackers hidden remote desktop access to the compromised system, enabling them to perform unauthorized actions without the user’s knowledge.
  • DCRat (DarkCrystal RAT): A multi-functional remote access tool used for spying and data exfiltration. This RAT allows attackers to steal sensitive information and monitor user activity.
  • Babylon RAT: This RAT provides attackers with complete control over the infected device, allowing them to execute commands, access files, and perform other malicious activities.

Fortinet researchers have observed that the attackers utilize various methods to conceal their malicious code. These include string obfuscation, modification of registry settings for persistence, and in-memory code execution to minimize the footprint on the disk and evade detection.

The phishing campaign has been active since early August 2025 and exhibits a global reach. High volumes of activity have been observed in Austria, Belarus, Canada, Egypt, India, and Pakistan. The sectors most affected by this campaign include manufacturing, technology, healthcare, construction, and retail/hospitality. Data suggests the rapid proliferation of this threat, with detections doubling within a two-week period.

This attack is designed for long-term persistence, delivering a chain of malware that remains hidden within corporate systems. Fortinet advises, “Users and organizations should take this threat seriously, use strong email filters, and make sure staff are trained to recognize and avoid these types of attacks.”


Featured image credit

Tags: upcrypterWindows

Related Posts

Zoom announces AI Companion 3.0 at Zoomtopia

Zoom announces AI Companion 3.0 at Zoomtopia

September 19, 2025
Google Cloud adds Lovable and Windsurf as AI coding customers

Google Cloud adds Lovable and Windsurf as AI coding customers

September 19, 2025
Radware tricks ChatGPT’s Deep Research into Gmail data leak

Radware tricks ChatGPT’s Deep Research into Gmail data leak

September 19, 2025
Elon Musk’s xAI chatbot Grok exposed hundreds of thousands of private user conversations

Elon Musk’s xAI chatbot Grok exposed hundreds of thousands of private user conversations

September 19, 2025
Roblox game Steal a Brainrot removes AI-generated character, sparking fan backlash and a debate over copyright

Roblox game Steal a Brainrot removes AI-generated character, sparking fan backlash and a debate over copyright

September 19, 2025
DeepSeek releases R1 model trained for 4,000 on 512 H800 GPUs

DeepSeek releases R1 model trained for $294,000 on 512 H800 GPUs

September 19, 2025

LATEST NEWS

Zoom announces AI Companion 3.0 at Zoomtopia

Google Cloud adds Lovable and Windsurf as AI coding customers

Radware tricks ChatGPT’s Deep Research into Gmail data leak

Elon Musk’s xAI chatbot Grok exposed hundreds of thousands of private user conversations

Roblox game Steal a Brainrot removes AI-generated character, sparking fan backlash and a debate over copyright

DeepSeek releases R1 model trained for $294,000 on 512 H800 GPUs

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.