By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading
Computing

ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading

News Room
Last updated: 2025/04/14 at 12:18 PM
News Room Published 14 April 2025
Share
SHARE

Cybersecurity researchers have discovered a new, sophisticated remote access trojan called ResolverRAT that has been observed in attacks targeting healthcare and pharmaceutical sectors.

“The threat actor leverages fear-based lures delivered via phishing emails, designed to pressure recipients into clicking a malicious link,” Morphisec Labs researcher Nadav Lorber said in a report shared with The Hacker News. “Once accessed, the link directs the user to download and open a file that triggers the ResolverRAT execution chain.”

The activity, observed as recently as March 10, 2025, shares infrastructure and delivery mechanism overlap with phishing campaigns that have delivered information stealer malware such as Lumma and Rhadamanthys, as documented by Cisco Talos and Check Point last year.

Cybersecurity

A notable aspect of the campaign is the use of localized phishing lures, with the emails crafted in the languages predominantly spoken in the targeted countries. This includes Hindi, Italian, Czech, Turkish, Portuguese, and Indonesian, indicating the threat actor’s attempts to cast a wide net through region-specific targeting and maximize infection rates.

The textual content in the email messages employs themes related to legal investigations or copyright violations that seek to induce a false sense of urgency and increase the likelihood of user interaction.

The infection chain is characterized by the use of the DLL side-loading technique to initiate the process. The first stage is an in-memory loader that decrypts and executes the main payload while also incorporating a bevy of tricks to fly under the radar. Not only does the ResolverRAT payload use encryption and compression, but it also exists only in memory once it’s decoded.

“The ResolverRAT’s initialization sequence reveals a sophisticated, multi-stage bootstrapping process engineered for stealth and resilience,” Lorber said, adding it “implements multiple redundant persistence methods” by means of Windows Registry and on the file system by installing itself in different locations as a fallback mechanism.

Once launched, the malware utilizes a bespoke certificate-based authentication prior to establishing contact with a command-and-control (C2) server such that it bypasses the machine’s root authorities. It also implements an IP rotation system to connect to an alternate C2 server if the primary C2 server becomes unavailable or gets taken down.

Furthermore, ResolverRAT is fitted with capabilities to sidestep detection efforts through certificate pinning, source code obfuscation, and irregular beaconing patterns to the C2 server.

“This advanced C2 infrastructure demonstrates the advanced capabilities of the threat actor, combining secure communications, fallback mechanisms, and evasion techniques designed to maintain persistent access while evading detection by security monitoring systems,” Morphisec said.

The ultimate goal of the malware is to process commands issued by the C2 server and exfiltrate the responses back, breaking data over 1 MB in size into 16 KB chunks so as to minimize the chances of detection.

The campaign has yet to be attributed to a specific group or country, although the similarities in lure themes and the use of DLL side-loading with previously observed phishing attacks allude to a possible connection.

“The alignment […] indicates a possible overlap in threat actor infrastructure or operational playbooks, potentially pointing to a shared affiliate model or coordinated activity among related threat groups,” the company said.

Cybersecurity

The development comes as CYFIRMA detailed another remote access trojan codenamed Neptune RAT that uses a modular, plugin-based approach to steal information, maintain persistence on the host, demand a $500 ransom, and even overwrite the Master Boot Record (MBR) to disrupt the normal functioning of the Windows system.

It’s being propagated freely via GitHub, Telegram, and YouTube. That said, the GitHub profile associated with the malware, called the MasonGroup (aka FREEMASONRY), is no longer accessible.

“Neptune RAT incorporates advanced anti-analysis techniques and persistence methods to maintain its presence on the victim’s system for extended periods and comes packed with dangerous features,” the company noted in an analysis published last week.

It includes a “crypto clipper, password stealer with capabilities to exfiltrate over 270+ different applications’ credentials, ransomware capabilities, and live desktop monitoring, making it an extremely serious threat.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Still have an old device running Android 12? It’s finally time to upgrade
Next Article Report: Cybersecurity, Not AI, is Businesses’ Top Concern
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

The security camera I own is 20% off for Prime Day, and I couldn’t recommend it more | Stuff
Gadget
Apple releases watchOS 26 beta 3, here’s what to expect – 9to5Mac
News
Ask an Investor: Lessons from Africa’s new-crop of investors
Computing
What to know about deadly Texas flash flooding
News

You Might also Like

Computing

Ask an Investor: Lessons from Africa’s new-crop of investors

7 Min Read
Computing

Junior Cybersecurity Roles Are Vanishing—Blame Agentic AI | HackerNoon

11 Min Read
Computing

Shanghai authorities call for “reviewable and trustworthy” AI tech · TechNode

1 Min Read
Computing

Kenya’s BuuPass secures fresh investment from Yango Ventures

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?