Tuesday, April 22, 2025
Homecyber securityNew Malware 'Desert Dexter' Hits Over 900 Victims Worldwide

New Malware ‘Desert Dexter’ Hits Over 900 Victims Worldwide

Published on

SIEM as a Service

Follow Us on Google News

A newly discovered malicious campaign dubbed “Desert Dexter” has infected approximately 900 victims across multiple countries, primarily in the Middle East and North Africa.

The Positive Technologies Expert Security Center (PT ESC) uncovered the operation, which has been active since September 2024.

The threat actors behind Desert Dexter employ a multi-stage attack chain that leverages social media platforms, legitimate file-sharing services, and geopolitical lures to distribute a modified version of the AsyncRAT malware.

- Advertisement - Google News

The campaign’s sophistication lies in its use of Facebook* advertisements and Telegram channels masquerading as reputable news agencies to disseminate malicious content.

Desert Dexte
Map of detected ad posts

Innovative Tactics and Technical Details

The initial infection vector involves enticing victims to download RAR archives containing malicious scripts from either files.fm or specially created Telegram channels.

Desert Dexte
Message containing a malicious archive in a Telegram channel

These scripts, written in various languages including JavaScript, batch, and PowerShell, work in concert to execute the final payload a customized AsyncRAT variant.

This modified AsyncRAT incorporates several notable features:

  1. A custom reflective loader written in C# for injecting the malware into legitimate Windows processes.
  2. An offline keylogger that logs keystrokes and active process names to a temporary file.
  3. An enhanced IdSender module capable of detecting cryptocurrency wallet extensions and applications.

The malware establishes persistence by manipulating Windows registry run keys and employs DDNS domains resolving to VPN service IP addresses for command and control communication.

Geopolitical Context and Victim Profile

According tot the Report, Desert Dexter’s campaign exploits the volatile political climate in the targeted regions, using alleged leaks of confidential data as bait.

The majority of victims appear to be ordinary users, though some infections have been detected in critical sectors such as oil production, construction, and information technology.

The threat actors’ focus on cryptocurrency-related data suggests financial motivation, although the true extent of their objectives remains unclear.

As geopolitical tensions continue to fuel cyber operations in the Middle East and North Africa, Desert Dexter serves as a stark reminder of the evolving threat landscape in these regions.

Security researchers continue to monitor Desert Dexter’s activities, emphasizing the need for heightened cybersecurity awareness and robust defense measures against such sophisticated social engineering tactics and malware deployment strategies.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Samsung One UI Vulnerability Leaks Sensitive Data in Plain Text With No Expiration!

A glaring vulnerability has come to light within Samsung's One UI interface: the clipboard...

New Rust-Based Botnet Hijacks Routers to Inject Remote Commands

A new malware named "RustoBot" has been discovered exploiting vulnerabilities in various router models...

Latest Lumma InfoStealer Variant Found Using Code Flow Obfuscation

Researchers have uncovered a sophisticated new variant of the notorious Lumma InfoStealer malware, employing...

Magecart Launches New Attack Using Malicious JavaScript to Steal Credit Card Data

The notorious Magecart group has been identified by the Yarix Incident Response Team as...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Samsung One UI Vulnerability Leaks Sensitive Data in Plain Text With No Expiration!

A glaring vulnerability has come to light within Samsung's One UI interface: the clipboard...

New Rust-Based Botnet Hijacks Routers to Inject Remote Commands

A new malware named "RustoBot" has been discovered exploiting vulnerabilities in various router models...

Latest Lumma InfoStealer Variant Found Using Code Flow Obfuscation

Researchers have uncovered a sophisticated new variant of the notorious Lumma InfoStealer malware, employing...