Categories: Cyber Security News

Windows Users Under Siege From AI Fueled RevengeHotels Using VenomRAT

RevengeHotels (TA558), active since 2015, has intensified its cyberattacks against the hospitality sector by harnessing AI to craft sophisticated phishing campaigns that deploy the VenomRAT remote access Trojan.

Initially, victims receive invoice-themed emails, often in Portuguese or Spanish, containing links to counterfeit document-storage sites.

Upon visiting these sites, a JavaScript loader (e.g., Fat146571.js) is automatically downloaded. Analysis of these loaders reveals AI-generated code well-commented, cleanly structured, and variable-driven, unlike the heavily obfuscated scripts of earlier campaigns.

Example of a phishing email about a booking confirmation

AI-Generated Loaders and VenomRAT Deployment

The JavaScript loader decodes an embedded buffer and writes a timestamped PowerShell script (e.g., SGDoHBZQWpLKXCAoTHXdBGlnQJLZCGBOVGLH_{TIMESTAMP}.ps1), which executes repeatedly to fetch two Base64-encoded payloads: a secondary loader (venumentrada.txt) and the VenomRAT implant (runpe.txt).

VenomRAT, derived from QuasarRAT, first emerged in 2020 and offers advanced functions including HVNC hidden desktop, reverse proxy, file grabbing, UAC exploitation, and ngrok-based tunneling.

AI-generated code in a malicious implant, as compared to custom code

Communications with the command-and-control (C2) server undergo serialization, LZMA compression, and AES-128 encryption with HMAC-SHA256 authentication.

VenomRAT’s anti-kill features begin with the EnableProtection function, which modifies the process’s Discretionary Access Control List (DACL) to block termination.

A dedicated thread then monitors and forcefully terminates security-related processes every 50 milliseconds. Persistence is achieved via a VBScript written to the RunOnce registry key and a self-monitoring loop that relaunches the RAT if stopped.

With administrator privileges, the RAT elevates itself to a critical system process using RtlSetProcessIsCritical, preventing shutdown, and invokes SetThreadExecutionState to inhibit sleep mode.

In addition, VenomRAT disables Windows Defender by terminating MSASCui.exe and altering scheduled tasks and registry entries to deactivate Defender components. Stealth measures include deletion of Zone.

VenomRAT packages on the dark web

Identifier streams to remove download metadata and clear Windows event logs to erase forensic traces. The RAT also propagates via USB drives by copying itself  My Pictures.exe across removable media.

Throughout 2025, RevengeHotels has primarily targeted Brazilian hotels but has expanded into Spanish-speaking markets such as Argentina, Chile, and Mexico. Email themes now range from invoices and booking confirmations to fake job applications.

Organizations are urged to scrutinize unexpected invoice emails, validate URLs before clicking, and deploy endpoint defenses capable of detecting script-based loaders and encrypted RAT traffic.

As RevengeHotels continues to refine its tactics with AI, defenders must brace for ever-more polished social engineering and payload delivery methods.

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

The post Windows Users Under Siege From AI Fueled RevengeHotels Using VenomRAT appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Star Wars Icons: Darth Vader Now Up for Preorder With a Price Cut on Amazon

May the 4th is behind us now, but the fun isn't contained to a single…

8 minutes ago

WWE Teaser Might Have Revealed the Gears of War: E-Day Release Date

Fans think Gears of War: E-Day could be coming as soon as September, because of…

8 minutes ago

Battlestar Galactica: Scattered Hopes Review

Arguably the most famous episode of the 2004 Battlestar Galactica TV series is also one…

8 minutes ago

Directive 8020 Review

Making the leap to space feels like a big departure from the usually grounded horror…

1 hour ago

Xbox Game Pass for Discord Nitro Subscribers Officially Announced

Xbox and Discord have now officially unveiled the new starter edition of Xbox Game Pass…

1 hour ago

ShinyHunters Breaches Instructure Canvas LMS Through Free-For-Teacher Account Program

The infamous hacking group ShinyHunters has struck again, this time targeting Instructure, the company behind…

1 hour ago

This website uses cookies.