Wednesday, April 30, 2025
HomeComputer SecurityAdwind RAT Malware Attacks on US Petroleum Industry to Steal Sensitive Data

Adwind RAT Malware Attacks on US Petroleum Industry to Steal Sensitive Data

Published on

SIEM as a Service

Follow Us on Google News

A new malware campaign with the Adwind RAT variant particularly targets the petroleum industry in the US. Adwind, a.k.a Unrecom, Sockrat, JSocket, and jRat is a cross-platform RAT involved in multiple campaigns and it was also distributed via malware-as-a-service in underground markets.

With this campaign threat, actors used a new variant of adware RAT that implements multi-layer obfuscation to try to evade detection.

“We found multiple RAT samples hosted on the serving domain and spread across multiple directories, all hosted within the last month,” reads Netskope report.

- Advertisement - Google News

Adwind RAT Infection

The RAT served as a JAR payload from the domain “members[.]westnet[.]com[.]au/~joeven/”, Westnet is an Australian based ISP. Researchers noted that the same RAT hosted in multiple accounts and to evade detection they the extensions (*.png.jar.jar).

Once the JAR gets dropped in target machine, it creates a copy of itself into the %User% directory and creates registry entry to maintain persistence. Later it executes scripts to disable antivirus and firewall.

Then it creates an AES encryption routine and executes as a new Java thread and it loads the JRAT(Java Runtime Analysis Toolkit) class. JRAT is the open-source performance profiler for the Java platform.

The loaded JRAT class is responsible for downloading the RAT by connecting to the command and control server at 185[.]205[.]210[.]48. The RAT was cross-platform supported, it supports Windows, Linux, and Mac machines.

RAT Functionalities

  • Takes screenshots
  • Harvests credentials from Chrome, IE, and Edge
  • Accesses the webcam, record video and take photos
  • Records audio from the microphone
  • Encrypt and Transfers files
  • Collects general system and user information
  • Steals VPN certificates
  • Serves as a Key Logger

When compared to the previous campaigns the functionality of the RAT remains the same, threat actors made changes in the injection process to evade detection.

Indicators Of Compromise

3bdfd33017806b85949b6faa7d4b98e4
a32c109297ed1ca155598cd295c26611
a9175094b275a0aaed30604f7dceeb14
781fb531354d6f291f1ccab48da6d39f
0b7b52302c8c5df59d960dd97e3abdaf
185[.]205[.]210[.]48
huup://members[.]westnet[.]com[.]au/~philchief/
huup://members[.]westnet[.]com[.]au/~lionsnortham/
huup://members[.]westnet[.]com[.]au/~mcleodart/
huup://members[.]westnet[.]com[.]au/~jbush/
huup://members[.]westnet[.]com[.]au/~joeven/
huup://members[.]westnet[.]com[.]au/~howrahnursery_nbn/

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Link11 brings three brands together on one platform with new branding

Link11 has fully integrated DOSarrest and Reblaze to become one of Europe's leading providers...

Incident Response Playbooks – What Every CISO Should Have Ready

The Security Operations Center (SOC) is the nerve center of modern cybersecurity, responsible for...

The Role of CISOs in Managing Emerging Cybersecurity Threats Post-Pandemic

The Chief Information Security Officer (CISO) has emerged as one of the most critical...

Zimbra Collaboration GraphQL Flaw Lets Hackers Steal User Information

 A severe Cross-Site Request Forgery (CSRF) vulnerability in Zimbra Collaboration Suite (ZCS) versions 9.0...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Konni APT Deploys Multi-Stage Malware in Targeted Organizational Attacks

A sophisticated multi-stage malware campaign, potentially orchestrated by the North Korean Konni Advanced Persistent...

Outlaw Cybergang Launches Global Attacks on Linux Environments with New Malware

The Outlaw cybergang, also known as “Dota,” has intensified its global assault on Linux...

New Gremlin Stealer Advertised on Hacker Forums Targets Credit Card Data and Login Credentials

A formidable new information-stealing malware dubbed Gremlin Stealer has surfaced in the cybercrime underground,...