Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Upcrypter malware targets Windows users via phishing

byEmre Çıtak
August 27, 2025
in Cybersecurity, News

A global phishing attack is underway, targeting Windows users through deceptive emails containing UpCrypter malware. The attack, identified by cybersecurity researchers, aims to give hackers remote control over compromised systems worldwide.

Fortinet’s FortiGuard Labs has been actively tracking the UpCrypter activity. UpCrypter functions as a loader, designed to install various remote access tools (RATs). These tools enable malicious actors to maintain persistent access to infected machines, posing a significant threat to data security and system integrity.

The phishing emails are crafted to appear as legitimate notifications, often disguised as missed voicemails or purchase orders. Potential victims who interact with the attachments included in these emails are redirected to fraudulent websites. These websites are designed to mimic trusted platforms, frequently incorporating company logos to enhance credibility and deceive users into believing they are interacting with a legitimate entity.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

According to Fortinet, these deceptive web pages prompt users to download a ZIP file. This file contains a heavily obfuscated JavaScript dropper, which initiates the malware infection process. Upon execution, the JavaScript dropper triggers PowerShell commands in the background. These commands establish connections to attacker-controlled servers, facilitating the download and execution of subsequent stages of the malware.

Cara Lin, a Fortinet FortiGuard Labs researcher, stated, “These pages are designed to entice recipients into downloading JavaScript files that act as droppers for UpCrypter.” This highlights the deceptive nature of the attack and the importance of user vigilance in identifying and avoiding such threats.

Once executed, UpCrypter performs a system scan to identify the presence of sandbox environments or forensic tools. These environments are often used by security researchers to analyze malware behavior. If such tools are detected, UpCrypter attempts to thwart analysis by forcing a system reboot, disrupting the investigative process.

If no monitoring tools are detected, UpCrypter proceeds to download and execute additional malicious payloads. In some instances, the attackers employ steganography, concealing these payloads within seemingly innocuous images. This technique allows them to bypass antivirus software detection mechanisms, increasing the likelihood of successful infection.

The final stage of the attack involves the deployment of several malware variants, including:

  • PureHVNC: This tool grants attackers hidden remote desktop access to the compromised system, enabling them to perform unauthorized actions without the user’s knowledge.
  • DCRat (DarkCrystal RAT): A multi-functional remote access tool used for spying and data exfiltration. This RAT allows attackers to steal sensitive information and monitor user activity.
  • Babylon RAT: This RAT provides attackers with complete control over the infected device, allowing them to execute commands, access files, and perform other malicious activities.

Fortinet researchers have observed that the attackers utilize various methods to conceal their malicious code. These include string obfuscation, modification of registry settings for persistence, and in-memory code execution to minimize the footprint on the disk and evade detection.

The phishing campaign has been active since early August 2025 and exhibits a global reach. High volumes of activity have been observed in Austria, Belarus, Canada, Egypt, India, and Pakistan. The sectors most affected by this campaign include manufacturing, technology, healthcare, construction, and retail/hospitality. Data suggests the rapid proliferation of this threat, with detections doubling within a two-week period.

This attack is designed for long-term persistence, delivering a chain of malware that remains hidden within corporate systems. Fortinet advises, “Users and organizations should take this threat seriously, use strong email filters, and make sure staff are trained to recognize and avoid these types of attacks.”


Featured image credit

Tags: upcrypterWindows

Related Posts

Tech News Today: Nvidia builds the AI world while Adobe and Canva fight to rule it

Tech News Today: Nvidia builds the AI world while Adobe and Canva fight to rule it

October 31, 2025
Disney+ and Hulu streams now look sharper on Samsung TVs with HDR10+

Disney+ and Hulu streams now look sharper on Samsung TVs with HDR10+

October 31, 2025
Min Mode: Android 17 to have a special Always-On Display

Min Mode: Android 17 to have a special Always-On Display

October 31, 2025
Samsung Internet beta brings Galaxy AI to Windows PCs

Samsung Internet beta brings Galaxy AI to Windows PCs

October 31, 2025
Amazon cancels its Lord of the Rings MMO again

Amazon cancels its Lord of the Rings MMO again

October 31, 2025
Windows 11 on Quest 3: Microsoft’s answer to Vision Pro

Windows 11 on Quest 3: Microsoft’s answer to Vision Pro

October 31, 2025

LATEST NEWS

Tech News Today: Nvidia builds the AI world while Adobe and Canva fight to rule it

Disney+ and Hulu streams now look sharper on Samsung TVs with HDR10+

Min Mode: Android 17 to have a special Always-On Display

Samsung Internet beta brings Galaxy AI to Windows PCs

Amazon cancels its Lord of the Rings MMO again

Windows 11 on Quest 3: Microsoft’s answer to Vision Pro

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.