Researchers at the Recorded Future’s Insikt group have documented the evolution of the Rhadamanthys info stealer<\/a>. The malware was first identified in 2022, and since then it has been upgraded with advanced features, the latest version 0.7.0 introduces AI-driven capabilities for extracting cryptocurrency seed phrases from images. <\/p>\n\n\n\n
“This allows Rhadamanthys to extract cryptocurrency wallet seed phrases from images, making it a highly potent threat for anyone dealing in cryptocurrencies.” reads the report<\/strong><\/a> published by Recorded Future’s Insikt Group. “The malware can recognize seed phrase images on the client side and send them back to the command-and-control (C2) server for further exploitation.”
The subscription fee is $250 per month, or $550 for 90 days.<\/p>\n\n\n\n
Rhadamanthys uses mutex objects to ensure only one instance runs on an infected host at a time, utilizing specific bytes for mutex creation.<\/p>\n\n\n\n
“Knowing the mutex values and that Rhadamanthys will terminate if they are present enables the creation of a killswitch\/vaccine.” continues the report.<\/em><\/p>\n\n\n\n
Rhadamanthys has enhanced its functionality by implementing additional plugins, starting from version 0.5.0 and expanding in subsequent updates. The experts identify four main plugins, a Keylogger, DataSpyer, Clipper, and Reversed Proxy. In version 0.5.0, these plugins were implemented as .NET assemblies, loaded through the loader.dll<\/em> file responsible for managing .NET assemblies. However, with the release of version 0.7.0, the plugin system was updated. The plugins are now packaged in ZIP files containing two components: classes.dex<\/em> and manifest.json<\/em>, which resemble the structure of an Android Package Kit (APK), although they are not actual APKs.<\/p>\n\n\n\n