Thursday, March 27, 2025
HomeCyber Security NewsNew NonEuclid RAT Evades Antivirus and Encrypts Critical Files

New NonEuclid RAT Evades Antivirus and Encrypts Critical Files

Published on

SIEM as a Service

Follow Us on Google News

A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has been shown to pose a significant and ever-evolving cyber threat. 

The malware leverages a multifaceted approach to evade detection and maintain persistence, employing advanced techniques such as antivirus bypass, anti-detection mechanisms, anti-virtual machine checks, rootkit-like capabilities to conceal its presence, and the ability to modify system processes. 

NonEuclid employs privilege escalation methods, such as User Account Control (UAC) bypass and exploitation of system vulnerabilities, to gain elevated system privileges and execute commands with increased authority, enabling it to manipulate critical system functions and compromise sensitive data.

Initial Connection
Initial Connection

It also incorporates ransomware capabilities, encrypting specific file types like .CSV, .TXT, and .PHP and appending the “.NonEuclid” extension to the filenames, effectively holding critical data hostage and disrupting business operations. 

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Distributed through various channels, including social media, underground forums, and phishing campaigns, NonEuclid presents a serious risk to both organizations and individuals due to its stealthy operations, evasive tactics, and destructive potential.

The malware utilizes a combination of techniques to maintain persistence, including scheduled tasks, manipulation of the Windows Registry, service manipulation, and the creation of hidden files and directories that ensure its continued presence on the infected system and hinder removal efforts. 

Camera access
Camera access

NonEuclid’s advanced features include such as dynamic DLL loading, robust AES encryption, the ability to steal sensitive information like credentials, system data, and cryptocurrency wallets. 

The capability to remotely control infected systems for malicious activities like data exfiltration, botnet participation, and launching further attacks.

According to Cyfirma, the potential for lateral movement within a network significantly enhances its resilience against detection and removal efforts, making it a highly challenging and dangerous threat to mitigate.

numerous users across various Russian forums and Discord channels were actively advertising, selling, and discussing the NonEuclid RAT
numerous users across various Russian forums and Discord channels were actively advertising, selling, and discussing the NonEuclid RAT

In order to escape security measures and deliver ransomware payloads, the NonEuclid Remote Access Tool (RAT) makes use of sophisticated techniques such as stealth mechanisms, anti-detection, and privilege escalation. 

Its widespread dissemination across online platforms demonstrates that it is becoming increasingly popular among cybercriminals and presents significant challenges to those who are tasked with protecting against it.

To mitigate threats like NonEuclid RAT, organizations should enhance threat intelligence sharing, invest in AI-driven security tools, deploy EDR solutions, strengthen user awareness, implement strict privilege management, and perform regular patch management and audits.

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Blacklock Ransomware Infrastructure Breached, Revealing Planned Attacks

Resecurity, a prominent cybersecurity firm, has successfully exploited a vulnerability in the Data Leak...

Classiscam Operators Use Automated Malicious Sites to Steal Financial Data

Classiscam, an automated scam-as-a-service operation, has been identified as a significant threat in Central...

G2 Names INE 2025 Cybersecurity Training Leader

INE, a global leader in networking and cybersecurity training and certifications, is proud to...

Threat Actors Compromise 150,000 Websites to Promote Chinese Gambling Platforms

A large-scale cyberattack has compromised approximately 150,000 legitimate websites by injecting malicious JavaScript to...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Blacklock Ransomware Infrastructure Breached, Revealing Planned Attacks

Resecurity, a prominent cybersecurity firm, has successfully exploited a vulnerability in the Data Leak...

Classiscam Operators Use Automated Malicious Sites to Steal Financial Data

Classiscam, an automated scam-as-a-service operation, has been identified as a significant threat in Central...

Threat Actors Compromise 150,000 Websites to Promote Chinese Gambling Platforms

A large-scale cyberattack has compromised approximately 150,000 legitimate websites by injecting malicious JavaScript to...