{"id":7171,"date":"2025-09-29T16:16:11","date_gmt":"2025-09-29T16:16:11","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=7171"},"modified":"2025-09-29T16:16:11","modified_gmt":"2025-09-29T16:16:11","slug":"new-spear-phishing-assault-deploys-darkcloud-malware-to-steal-keystrokes-and-credentials","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=7171","title":{"rendered":"New Spear-Phishing Assault Deploys DarkCloud Malware to Steal Keystrokes and Credentials"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>Adversaries don\u2019t work 9\u20135 and neither will we. At eSentire, our 24\/7 SOCs are staffed with elite menace hunters and cyber analysts who hunt, examine, include and reply to threats inside minutes. <\/p>\n<p>Backed by menace intelligence, tactical menace response and superior menace analytics from our Menace Response Unit (TRU), eSentire delivers speedy detection and disruption towards at the moment\u2019s most harmful assaults. <\/p>\n<p>On this TRU Constructive, we define our investigation of a brand new spear-phishing marketing campaign that tried to ship the DarkCloud infostealer to a producing buyer\u2014and reveal our suggestions for defending towards this evolving menace.<\/p>\n<p>In September 2025, eSentire\u2019s TRU<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.esentire.com\/blog\/eye-of-the-storm-analyzing-darkclouds-latest-capabilities\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"> detected<\/a> a focused spear-phishing marketing campaign geared toward a mid-sized producer\u2019s Zendesk help inbox. <\/p>\n<p>The attackers used a banking-themed lure\u2014\u201cSwift Message MT103 Addiko Financial institution advert: FT2521935SVT\u201d\u2014and despatched a malicious zip attachment, \u201cSwift Message MT103 FT2521935SVT.zip,\u201d containing DarkCloud model 3.2 (\u201cSwift Message MT103 FT2521935SVT.exe\u201d). <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"955\" height=\"381\" src=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-2.png\" alt=\"Phishing lure.\" class=\"wp-image-164533\" srcset=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-2.png 955w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-2-300x120.png 300w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-2-768x306.png 768w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-2-150x60.png 150w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-2-696x278.png 696w\" sizes=\"(max-width: 955px) 100vw, 955px\"\/><figcaption class=\"wp-element-caption\"><em>Phishing lure<\/em>.<\/figcaption><\/figure>\n<\/div>\n<p>Previously offered on the now-defunct XSS.is discussion board and rebuilt from .NET into VB6, DarkCloud has advanced with string encryption, sandbox evasion checks and an up to date stub. <\/p>\n<p>As soon as executed, it harvests browser passwords, bank cards, cookies, keystrokes, FTP credentials, clipboard contents, electronic mail contacts, information and cryptocurrency wallets, exfiltrating stolen information by way of Telegram, FTP, SMTP or PHP internet panels.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"498\" src=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-4-1024x498.png\" alt=\"DarkCloud website &quot;PASSWORD RECOVERY&quot;.\" class=\"wp-image-164535\" srcset=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-4-1024x498.png 1024w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-4-300x146.png 300w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-4-768x373.png 768w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-4-1536x747.png 1536w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-4-864x420.png 864w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-4-150x73.png 150w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-4-696x338.png 696w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-4-1068x519.png 1068w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-4.png 1549w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"\/><figcaption class=\"wp-element-caption\"><em>DarkCloud web site \u201cPASSWORD RECOVERY\u201d<\/em>.<\/figcaption><\/figure>\n<\/div>\n<p>The lure electronic mail, despatched from procure@bmuxitq[.]store, mimicked professional monetary correspondence to evade detection. <\/p>\n<p>By attaching a packed<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/darkcloud-stealer-uses-novel-infection-chain\/\" target=\"_blank\" rel=\"noreferrer noopener\"> DarkCloud<\/a> pattern underneath the guise of a transaction replace, the attackers sought to trick analysts into enabling the malware. <\/p>\n<p>DarkCloud is actively marketed by way of darkcloud.onlinewebshop[.]web and Telegram person @BluCoder, with a fa\u00e7ade of professional software program options: password restoration, keystroke harvesting, crypto-clipping, file grabbing and extra.<\/p>\n<h2 class=\"wp-block-heading\" id=\"technical-analysis\"><strong>Technical Evaluation<\/strong><\/h2>\n<p>DarkCloud\u2019s builder requires the VB6 IDE to compile domestically, mirroring previous errors by Redline Stealer. <\/p>\n<p>This method exposes the writer\u2019s supply code and facilitates unauthorized forks. The most recent DarkCloud 4.2 helps non-obligatory string encryption by way of a VB6-specific Caesar cipher seeded by the Randomize\/Rnd capabilities. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"952\" height=\"281\" src=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-7.png\" alt=\"Encrypted string\/key string.\" class=\"wp-image-164537\" srcset=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-7.png 952w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-7-300x89.png 300w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-7-768x227.png 768w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-7-150x44.png 150w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-7-696x205.png 696w\" sizes=\"auto, (max-width: 952px) 100vw, 952px\"\/><figcaption class=\"wp-element-caption\"><em>Encrypted string\/key string<\/em>.<\/figcaption><\/figure>\n<\/div>\n<p>By reverse-engineering msvbvm60.dll\u2019s rtcRandomize and rtcRandomNext implementations, analysts can decrypt obfuscated strings to disclose exfiltration <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/azure-ad-vulnerability-leaks-credentials\/\" target=\"_blank\" rel=\"noreferrer noopener\">credentials<\/a> and command-and-control endpoints.<\/p>\n<p>Extra performance consists of WMI-based system profiling (Win32_Processor, Win32_OperatingSystem, disk dimension, reminiscence, processor depend), VBScript-powered credit-card regex parsing, electronic mail contact harvesting for Thunderbird and different shoppers, sandbox and VM detection by way of course of identify checks, disk\/reminiscence thresholds and file existence queries. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"619\" height=\"128\" src=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-10.png\" alt=\"System information collection.\" class=\"wp-image-164540\" srcset=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-10.png 619w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-10-300x62.png 300w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/09\/Analyzing-DarkClouds-Latest-Capabilities-Figure-10-150x31.png 150w\" sizes=\"auto, (max-width: 619px) 100vw, 619px\"\/><figcaption class=\"wp-element-caption\"><em>System data assortment<\/em>.<\/figcaption><\/figure>\n<\/div>\n<p>Persistence is achieved by way of randomized RunOnce registry entries. DarkCloud\u2019s file grabber targets paperwork, spreadsheets, PDFs and extra, whereas crypto-wallet theft spans main pockets directories (Exodus, Electrum, Coinomi, MetaMask, and so on.).<\/p>\n<p>To thwart researchers, DarkCloud halts execution if fewer than 50 processes are operating or if blacklisted sandbox instruments (<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/wireshark-2-6-6-2-4-12-crashed\/\" target=\"_blank\" rel=\"noreferrer noopener\">Wireshark<\/a>, procmon, AutoIt, and so on.) are detected. <\/p>\n<h2 class=\"wp-block-heading\" id=\"evasion-and-exfiltration\"><strong>Evasion and Exfiltration<\/strong><\/h2>\n<p>For exfiltration, it gathers the sufferer\u2019s exterior IP by way of showip[.]web or mediacollege[.]com utilities, then sends logs over SMTP (together with SSL), <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/hackers-hijack-telegram-accounts\/\" target=\"_blank\" rel=\"noreferrer noopener\">Telegram <\/a>API, FTP or PHP internet panels. PCAP evaluation from VirusTotal\u2019s CAPE Sandbox confirms every technique in real-world site visitors captures.<\/p>\n<p>Our 24\/7 SOC analysts recognized the spam marketing campaign, quarantined malicious emails and blocked the DarkCloud executable on behalf of the shopper. We guided the remediation course of\u2014resetting credentials, scanning for residua and reinforcing electronic mail filtering insurance policies.<\/p>\n<p>E-mail stays a major malware vector. To protect towards DarkCloud and related threats:<\/p>\n<ul class=\"wp-block-list\">\n<li>\u2002Implement electronic mail safety guidelines to dam ZIP attachments with executables or scripts.<\/li>\n<li>\u2002Implement Phishing and Safety Consciousness Coaching (PSAT) to teach employees on social engineering techniques.<\/li>\n<li>\u2002Associate with a 24\/7 MDR service for steady menace looking, multi-signal visibility and speedy response.<\/li>\n<li>\u2002Deploy Subsequent-Gen AV or Endpoint Detection and Response (EDR) to detect, block and include infostealers.<\/li>\n<\/ul>\n<p>By combining proactive menace looking, safety consciousness and superior analytics, organizations can keep forward of adversaries\u2019 evolving strategies\u2014and be sure that DarkCloud by no means delivers on its promise of widespread credential theft.<\/p>\n<p class=\"has-text-align-center has-background\" style=\"background:linear-gradient(135deg,rgb(238,238,238) 100%,rgb(169,184,195) 100%)\"><strong>Observe us on\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.google.com\/publications\/CAAqKAgKIiJDQklTRXdnTWFnOEtEV2RpYUdGamEyVnljeTVqYjIwb0FBUAE?hl=en-IN&amp;gl=IN&amp;ceid=IN%3Aen\" target=\"_blank\" rel=\"noreferrer noopener\">Google Information<\/a>,\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/cyber-threat-intel\/\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn<\/a>, and\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/The_Cyber_News\" target=\"_blank\" rel=\"noreferrer noopener\">X<\/a>\u00a0to Get Immediate Updates and Set GBH as a Most popular Supply in\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.google.com\/preferences\/source?q=https:\/\/gbhackers.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Google<\/a>.<\/strong><\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Adversaries don\u2019t work 9\u20135 and neither will we. At eSentire, our 24\/7 SOCs are staffed with elite menace hunters and cyber analysts who hunt, examine, include and reply to threats inside minutes. Backed by menace intelligence, tactical menace response and superior menace analytics from our Menace Response Unit (TRU), eSentire delivers speedy detection and disruption [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":7173,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[717,483,5622,1535,5623,216,3994,1443],"class_list":["post-7171","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-attack","tag-credentials","tag-darkcloud","tag-deploys","tag-keystrokes","tag-malware","tag-spearphishing","tag-steal"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/7171","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7171"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/7171\/revisions"}],"predecessor-version":[{"id":7172,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/7171\/revisions\/7172"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/7173"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-04-19 08:56:12 UTC -->