κατασκευή ιστοσελίδων ρόδος

TECH - WEB DEVELOPMENT NEWS

Get the latest tech - web development news and analysis on industry around the world.

  • HOME
You are here: Home / INDUSTRY NEWS / Rhadamanthys Stealer Available on Dark Web Prices Ranging from $299 to $499
άμυνα
.

Rhadamanthys Stealer Available on Dark Web Prices Ranging from $299 to $499

03/10/2025

Rhadamanthys, a sophisticated multi-modular information stealer, first emerged in September 2022 and has since evolved into one of the most commercially advanced malware offerings on underground forums.

Originally advertised by the actor “kingcrete2022,” its initial design drew heavily on the earlier Hidden Bee project, enabling rapid feature growth and professional polish.

Over time, Rhadamanthys steadily gained traction through targeted campaigns such as ClickFix, attracting both novice affiliates and seasoned threat actors.

As of October 2025, the latest 0.9.2 release introduces incremental refinements to its loader architecture, custom executable formats, and evasion routines, reinforcing its position as a long-term business venture rather than a disposable side project.

Check Point analysts noted that Rhadamanthys is marketed under the “RHAD Security” and “Mythical Origin Labs” brands, complete with a revamped Tor storefront, Telegram support channel, and tiered licensing model.

The malware is offered at $299 per month for a self-hosted package and $499 per month for a rented server deployment, with enterprise pricing available through individual negotiation.

Pricing of Rhadamanthys (Source – Check Point)

This professionalization underscores the developers’ commitment to sustained feature development, robust support, and ongoing customization options.

Technically, Rhadamanthys is distributed via a polymorphic initial loader available in both .NET and native PE forms. The native 32- and 64-bit loaders unpack into shellcode that deploys a proprietary XS format package containing core modules.

Each module—ranging from environment checks to the stealer core—is obfuscated in a custom container, requiring specialized conversion tools to reconstruct into standard PE files for analysis.

Attackers’ website, main view (Source – Check Point)

The latest modifications in version 0.9.x introduce XS1B and XS2B headers, a streamlined import deobfuscation key, and updated configuration markers swapped from 0x59485221 to 0xBEEF.

Infection Mechanism

A key infection vector in Rhadamanthys 0.9.2 involves steganographic delivery of the Stage 3 payload via PNG images rather than the earlier WAV or JPG templates.

Upon establishing a WebSocket connection to its C2, the embedded Netclient module retrieves a seemingly innocuous PNG that encodes the next-stage package in pixel data.

The loader processes the image header to locate a shared secret, then applies ChaCha20 decryption followed by LZO decompression to extract the XS2B modules.

Core deobfuscation routines employ an RC4-based algorithm replacing the prior XOR scheme, ensuring existing IDA scripts fail until updated.

Example decryption pseudocode:-

void rc4_decrypt(uint8_t *data, size_t len, uint8_t *key, size_t keylen) {
uint8_t S[256], i = 0, j = 0, tmp;
for (int k = 0; k < 256; k++) S[k] = k;
for (int k = 0; k < 256; k++) {
j = (j + S[k] + key[k % keylen]) & 0xFF;
tmp = S[k]; S[k] = S[j]; S[j] = tmp;
}
i = j = 0;
for (size_t k = 0; k < len; k++) {
i = (i + 1) & 0xFF;
j = (j + S[i]) & 0xFF;
tmp = S[i]; S[i] = S[j]; S[j] = tmp;
data[k] ^= S[(S[i] + S[j]) & 0xFF];
}
}

This shift to PNG-based steganography reduces the need for complex media parsing and simplifies payload retrieval under the guise of ordinary web traffic.

Once unpacked, Stage 3 modules deploy into a suspended legitimate process chosen from a configurable list, then inject the stealer core to harvest credentials, browser profiles, crypto wallets, and system fingerprints.

Through this streamlined infection chain and flexible delivery options, Rhadamanthys continues to challenge defenders and underscores the importance of monitoring custom image-based payloads alongside traditional executable attachments.

Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.

Source: cybersecuritynews.com

Filed Under: INDUSTRY NEWS Tagged With: Source-10

5 ways mice can easily become more user-repairable

We use peripherals like keyboards and mice nearly every minute our PCs are awake, yet they seem to draw the short straw in terms of innovation. We’ve had a solid run with mechanical keyboards, where a vibrant community has pushed the industry from soldered, inaccessible boards to hot-swappable, endlessly customizable typing instruments. We’ve seen PC cases evolve with modularity and ease-of-access … [Read More...]

Anker's latest Prime charging devices are already 20 percent off

Anker's latest Prime charging devices are already on sale thanks to some handy coupons. The best deals include the laptop-compatible Prime Power Bank (26,250mAh, 300W), which is 20 percent off and down to $184 when you clip the on-page coupon on its Amazon page.This portable charger delivers a whopping 300W of total output between its two USB-C ports and single USB-A port. Anker says that, thanks … [Read More...]

This free browser extension was a game changer for my Dungeons & Dragons group

I love playing tabletop roleplaying games (TTRPGs), but virtual games just aren’t the same for me, especially when it comes to dice. There’s just something so satisfying about watching your d20 clatter around on the table (before probably landing on a nat one) that you usually miss out on with digital dice rolls in virtual games. Source: xda-developers.com … [Read More...]

If you can get past the terrible logo, Audacity 4 looks pretty great

Over 25 years it’s gone from a clean and simple audio editor, to a UX nightmare. Version 4 aims to fix that.Oct 5, 2025, 5:37 PM UTCTerrence O'Brien is the Verge’s weekend editor. He has over 18 years of experience, including 10 years as managing editor at Engadget.Rebrands rarely get much love. That backlash can be especially strong if you’re giving a facelift to a decades-old piece of software … [Read More...]

Uber and Lyft drivers in California are able to unionize under new law

California governor Gavin Newsom signed legislation on Friday that grants rideshare drivers in the state the right to unionize. It's the second state to grant organizing rights to rideshare drivers, who are independent contractors, following the passage of a similar law in Massachusetts in 2024. There are over 800,000 rideshare drivers in California, and the bill that was just signed into law … [Read More...]

This Roomba robot vacuum is on sale for $150 for Prime Day

Robot vacuums are great items to look for during events like October Prime Day. They're usually hundreds of dollars off, so you can save a ton if you're buying one as a gift or you want to upgrade an aging robovac you have at home already. One of the best deals this time around is on the iRobot Roomba 104, which is 40 percent off and on sale for only $150.This is a newer version of the unit that … [Read More...]

Marvel's Wolverine needed to feel different than Insomniac's Spider-Man games

Fans have been wanting to see anything from Insomniac Games' upcoming Wolverine for PlayStation 5. Following the massive leak for the company that revealed most of the planned game releases and concepts for their titles, many fans were wondering if they would have to wait longer before catching an official glimpse at what was coming next. But during the State of Play showcase for PlayStation in … [Read More...]

ICE is planning to create a surveillance team that hunts for leads on social media

The US Immigration and Customs Enforcement (ICE) has plans to build out a 24/7/365 surveillance team that focuses on scouring social media for case leads, as revealed in documents first discovered by Wired. According to public records, ICE has put out a request for information — which allows the agency to detail its preliminary scope of work to gauge any interest from contractors — that details … [Read More...]

OpenAI and Jony Ive may be struggling to figure out their AI device

OpenAI and Jony Ive face significant technical challenges as they work to develop a screen-less, AI-powered device, according to the Financial Times. Back in May, OpenAI acquired io, the device startup founded by the legendary Apple designer with OpenAI CEO Sam Altman, for $6.5 billion. At the time, Altman declared that Ive and his team would help the company “create a new generation of … [Read More...]

An old Xeon may use a lot of power, but it's not as slow as you might think

Contrary to what you may believe, home labs don’t require a lot of monetary investment. Depending on your requirements, you can put together a reliable containerization server using budget-friendly SBCs. Heck, if you’ve got a spare PC gathering dust, you can even arm it with a virtualization platform and turn it into a powerful home server. Source: xda-developers.com … [Read More...]

Tags

Source-1 Source-2 Source-3 Source-4 Source-5 Source-6 Source-7 Source-8 Source-9 Source-10 Source-12 Source-13 Source-15 Source-16

Tech Web Development News

This is a PERSONAL and PRIVATE WEBPAGE. Please leave this page. Contact me via email : admin@news-6.com about anything you would like to ask or problem.

Tech News

Disclaimer!
In every post is written below the original source of the post. Copyrights belong on their owners.

Web Development News

HOTELS – CRUISES – CARS – TRAVEL

Recent Posts

  • 5 ways mice can easily become more user-repairable
  • Anker's latest Prime charging devices are already 20 percent off
  • This free browser extension was a game changer for my Dungeons & Dragons group
  • If you can get past the terrible logo, Audacity 4 looks pretty great
  • Uber and Lyft drivers in California are able to unionize under new law

Technology - Seo

Categories

  • INDUSTRY NEWS

World Industry News

Privacy & Cookies: This site uses cookies.
To find out more, as well as how to remove or block these, see here: Our Cookie Policy
TECH - WEB DEVELOPMENT NEWS @ COPYRIGHTS 2023