Trojanized FileZilla Downloads Used To Spread RATs via Multi-Stage Loader

Trojanized FileZilla Downloads Used To Spread RATs via Multi-Stage Loader
Trojanized FileZilla Downloads Used To Spread RATs via Multi-Stage Loader
In a recent cybersecurity development, trojanized FileZilla downloads are being used to spread Remote Access Trojans (RATs) via a multi-stage loader.

By leveraging fake websites that mimic the official download page, attackers successfully trick victims into downloading malicious software. This sophisticated campaign infects Windows systems through a alyac complex loading process.

The operation is highly organized, strictly targets specific victim groups, and heavily relies on advanced evasion techniques to bypass modern security detections.

Security researchers note that this incident highlights the persistent danger of social engineering attacks that manipulate users into compromising their systems.​​

Infection Vectors and Execution Flow

The attack begins with social engineering, prompting users to download infected files from deceptive sources manually. The malicious samples are currently being distributed in two distinct formats to maximize their operational reach.

In the first scenario, victims download a compressed archive containing a legitimate, portable version of FileZilla alongside a maliciously crafted system file named “version.dll”.

When the victim extracts the archive and runs the application, the Windows operating system inadvertently loads the malicious component instead of the legitimate system file.

Fake FileZilla Drops RATs (Source: alyac)
Fake FileZilla Drops RATs (Source: alyac)

This exploitation of the Windows search order, known as DLL side-loading, seamlessly triggers the hidden infection process.​​

Evasion Tactics and Threat Tracking

To ensure the prolonged success of their malicious campaign, the threat actors have implemented advanced evasion mechanisms.

The malware actively scans the infected system for virtual machine environments and security analysis tools. Specifically, it checks for various VMware processes and associated system drivers before continuing its execution.

Fake FileZilla Drops RATs (Source: alyac)
Fake FileZilla Drops RATs (Source: alyac)

If the software detects an analysis environment, it halts operation immediately to prevent security researchers from safely studying its behavior.

Furthermore, the malware utilizes DNS over HTTPS to securely disguise its command-and-control network communications.​

Fake FileZilla Drops RATs (Source: alyac)
Fake FileZilla Drops RATs (Source: alyac)

Key organizational indicators identified during the analysis include the following elements:

  • Campaign Tracking: The extensive use of tags enables attackers to monitor which distribution method is most effective continuously.​
  • Victim Profiling: The transmitted data includes detailed referrer information to systematically categorize compromised computer systems.​
  • Coordinated Operation: These structured tracking methods strongly indicate that a well-coordinated threat group is orchestrating the attack.​

To mitigate these sophisticated threats, organizations should implement strict application control policies and continuously monitor their network environments for unexpected DLL loading events.

Security professionals strongly advise users to verify the authenticity of all downloaded software and to ensure they obtain applications only from verified, alyac official vendor websites.

Furthermore, deploying advanced endpoint detection and response solutions can significantly help security teams identify, isolate, and block memory-based threats before the final malicious payload is fully executed on the host system.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post Trojanized FileZilla Downloads Used To Spread RATs via Multi-Stage Loader appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Leave a Reply

Your email address will not be published. Required fields are marked *

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading