Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Researchers Track ManticoraLoader Malware to Ares Malware Developer

    Researchers Track ManticoraLoader Malware to Ares Malware Developer

    August 31, 2024

    ManticoraLoader, a new malware-as-a-service (MaaS), was observed on the cybercriminal XSS forum being distributed by ‘DarkBLUP,’ an alias that was previously used to distribute malware from the DeadXInject group such as the still-active AresLoader malware and the AiDLocker ransomware.

    The new malware variant has been offered by DeadXInject on its Telegram channel since around August 8, 2024.

    ManticoraLoader Employs Stealth and Obfuscation

    ManticoraLoader boasts an impressive array of features that make it a versatile and potent tool for cybercriminal operations. Researchers from CRIL (Cyble Research and Intelligence Labs) indicated that the malware is compatible with Windows 7 and later versions, including Windows Server, allowing it to target a wide range of systems still in use today.

    Source: Cyble Blog

    One of its key features is a module designed to gather extensive information from infected devices, including IP address, username, system language, installed antivirus software, UUID, and date-time stamps. This detailed reconnaissance data is then transmitted back to a centralized control panel, enabling the threat actors to profile victims and tailor their attacks accordingly.

    Source: Cyble Blog

    The loader’s modular design allows for easy extension of functionalities upon request, making it adaptable to various malicious objectives. ManticoraLoader also employs sophisticated obfuscation techniques to evade detection, with a reported detection rate of 0/39 on Kleenscan.

    To further demonstrate its evasive capabilities, the actors posted a video showcasing the loader’s ability to bypass the 360 Total Security sandboxing solution.

    The threat actors have also designed ManticoraLoader with persistence in mind, as it can reportedly place files into auto-start locations, ensuring its continued presence on compromised systems. This modular design also allows for easy expansion of functionalities, making the loader adaptable to various malicious objectives.

    The threat actors behind ManticoraLoader have implemented a strict transaction process, limiting the number of clients to 10 and offering the service through the forum’s escrow service or direct contact via Telegram or TOX. This exclusivity may be a strategic move to maintain control and reduce exposure.

    The service is offered for a monthly rental fee of $500, indicating the threat actors’ intention to monetize their creation. This pricing model suggests that ManticoraLoader is not merely a one-off tool, but rather a carefully crafted MaaS designed to generate a steady stream of revenue for the cybercriminals.

    AresLoader Persists

    The researchers, however, are unclear why the threat actor DarkBLUP remained inactive for more than a year after their success with the AiDLocker ransomware and AresLoader. As AresLoader remains still widely in use among cybercriminals, the researchers suggest that the group is not abandoning its previous project but rather expanding their arsenal to diversify their malicious offerings and expand monetization.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleColumbus Judge Issues Restraining Order Against Cybersecurity Expert
    Next Article Goodbye Summer, Hello September (2024 Wallpapers Edition)

    Related Posts

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-3888 – “Jupiter X Core Stored Cross-Site Scripting Vulnerability”

    May 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2024-13613 – Wise Chat WordPress Sensitive Information Exposure

    May 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    AI-Powered No-Code Automation for Lead Generation

    Web Development

    Profanify

    Development

    This AR headset is changing how surgeons see inside their patients

    News & Updates

    Chordcat – chord naming program

    Development

    Highlights

    The best online photo printing services of 2025: Expert tested and reviewed

    May 1, 2025

    After you’ve taken and edited your photos, you’ll need a way to print them while…

    This Windows 11 Pro Mini PC is deceptively powerful for its size

    December 31, 2024

    This intriguing, upcoming indie Soulslike/Metroidvania hybrid has received a new title just a few months away from releasing for Xbox and PC

    January 31, 2025

    Black Hat Europe 2024: Can AI systems be socially engineered?

    December 20, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.