EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of operational security (OPSEC) failures and extensive reliance on ChatGPT for its operations.
This emerging threat actor has been linked to ransomware campaigns, data theft, and the development of advanced malware tools, including EncryptRAT.
However, critical mistakes in their operational infrastructure have exposed their activities, providing cybersecurity researchers with unprecedented insights into their tactics, techniques, and procedures (TTPs).
OPSEC Errors: A Double-Edged Sword
EncryptHub’s operations were compromised due to a series of glaring OPSEC blunders.
Key mistakes included enabling directory listings on core servers, exposing sensitive malware configuration files, and reusing passwords across multiple accounts.
These lapses allowed researchers to uncover vital details about their infrastructure and campaigns.
For instance, Telegram bot configurations used for data exfiltration were left accessible, and backup codes for two-factor authentication (2FA) were stored in plaintext files that were later exfiltrated by their own malware.
Additionally, EncryptHub mixed personal and criminal activities by using the same systems for both.

According to OutPost24, this included logging into personal accounts while testing malware and reusing domains from legitimate jobs for malicious purposes.
Such errors provided investigators with a clearer picture of the actor’s identity and operations.
A surprising revelation in the investigation was EncryptHub’s extensive use of ChatGPT as a development assistant.
The AI chatbot was employed to create malware components, configure command-and-control (C2) servers, and even draft phishing emails and underground forum posts.
EncryptHub also relied on ChatGPT for vulnerability research and code optimization, integrating these findings into their campaigns.

In one notable instance, the actor used ChatGPT to draft posts selling exploits for vulnerabilities they had previously reported under an alias to Microsoft’s Security Response Center (MSRC).
This dual role as both a white-hat researcher and black-hat hacker underscores the complexity of EncryptHub’s operations.

Attack Chain and Indicators of Compromise (IOCs)
According to the Report, EncryptHub’s multi-stage attack chain begins with trojanized applications disguised as legitimate software like WeChat, Google Meet, and Microsoft Visual Studio 2022.
These applications deploy PowerShell scripts to steal credentials from messaging apps, cryptocurrency wallets, and password managers.
Subsequent stages involve deploying additional payloads such as Rhadamanthys stealer or ransomware.
Key IOCs linked to EncryptHub include:
- Malware Hashes: Examples include
6f346b7dffc0c3872923dd0c3b2ddb7966a10961
(crypto.ps1) andcb41b440148b2d24d4877ab09514aa23a4253a17
(ram.ps1). - Domains: Notable domains used include
0xffsec[.]net
andvexio[.]io
. - IPs: Critical IPs include
206.166.251.99
and82.115.223.231
.
Despite their mistakes, EncryptHub remains a formidable threat due to their adaptability and technical expertise.
Their ongoing development of tools like EncryptRAT suggests potential commercialization of their malware arsenal.
Organizations are urged to strengthen endpoint defenses, monitor for IOCs, and implement robust multi-layered security strategies to mitigate risks posed by such actors.
EncryptHub’s case highlights the dual-edged nature of advanced technologies like AI in cybersecurity capable of both empowering defenders and enabling attackers.
As this threat actor continues to evolve, so too must the vigilance of the cybersecurity community.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!