Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms
    Cybersecurity

    Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms

    adminBy adminMarch 1, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananFeb 27, 2026Endpoint Security / Windows Security

    Threat actors are luring unsuspecting users into running trojanized gaming utilities that are distributed via browsers and chat platforms to distribute a remote access trojan (RAT).

    “A malicious downloader staged a portable Java runtime and executed a malicious Java archive (JAR) file named jd-gui.jar,” the Microsoft Threat Intelligence team said in a post on X. “This downloader used PowerShell and living-off-the-land binaries (LOLBins) like cmstp.exe for stealthy execution.”

    The attack chain is also designed to evade detection by deleting the initial downloader and by configuring Microsoft Defender exclusions for the RAT components.

    Persistence is achieved by means of a scheduled task and Windows startup script named “world.vbs,” before the final payload is deployed on the compromised host. The malware, per Microsoft, is a “multi-purpose malware” that acts as a loader, runner, downloader, and RAT.

    Once launched, it connects to an external server at “79.110.49[.]15” for command-and-control (C2) communications, allowing it to exfiltrate data and deploy additional payloads.

    As ways to defend against the threat, users are advised to audit Microsoft Defender exclusions and scheduled tasks, remove malicious tasks and startup scripts, isolate affected endpoints, and reset credentials for users active on compromised hosts.

    The disclosure comes as BlackFog disclosed details of a new Windows RAT malware family called Steaelite that was first advertised on criminal forums in November 2025 as a “best Windows RAT” with “fully undetectable” (FUD) capabilities. It’s compatible with both Windows 10 and 11.

    Unlike other off-the-shelf RATs sold to criminal actors, Steaelite bundles together data theft and ransomware, packaging them into one web panel, with an Android ransomware module on the way. The panel also incorporates various developer tools to facilitate keylogging, client-to-victim chat, file searching, USB spreading, wallpaper modification, UAC bypass, and clipper functionality. 

    Other notable features include removing competing malware, disabling Microsoft Defender, or configuring exclusions, and installing persistence methods.

    As for its main capabilities, Steaelite RAT supports remote code execution, file management, live streaming, webcam and microphone access, process management, clipboard monitoring, password theft, installed program enumeration, location tracking, arbitrary file execution, URL opening, DDoS attacks, and VB.NET payload compilation.

    “The tool gives operators browser-based control over infected Windows machines, covering remote code execution, credential theft, live surveillance, file exfiltration, and ransomware deployment from a single dashboard,” security researcher Wendy McCague said.

    “A single threat actor can browse files, exfiltrate documents, harvest credentials, and deploy ransomware from the same dashboard. This enables complete double extortion from one tool.”

    In recent weeks, threat hunters have also discovered two new RAT families tracked as DesckVB RAT and KazakRAT that enable comprehensive remote control over infected hosts and even selectively deploy capabilities post-compromise. According to Ctrl Alt Intel, KazakRAT is suspected to be the work of a suspected state-affiliated cluster targeting Kazakh and Afghan entities as part of a persistent campaign ongoing since at least August 2022.

    Browser chat gaming JavaBased Platforms RAT spread tools Trojanized
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleRansomware activity peaks outside business hours
    Next Article This high-stakes thriller is the best thing on Hulu right now
    admin
    • Website

    Related Posts

    Vercel systems targeted after third-party tool compromised

    April 21, 2026

    KelpDAO suffers $290 million heist tied to Lazarus hackers

    April 21, 2026

    Hackers Abuse QEMU for Defense Evasion

    April 21, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Palantir Has a Human Rights Policy. Its ICE Work Tells a Different Story

    April 21, 2026

    Vercel systems targeted after third-party tool compromised

    April 21, 2026

    The digital PR duplication method: Rinse, reuse, repeat

    April 21, 2026

    Valve’s new Linux VRAM fix almost triples framerates in some games on the 4GB Radeon RX 6500 XT

    April 21, 2026
    Categories
    • Blogging (66)
    • Cybersecurity (1,419)
    • Privacy & Online Earning (175)
    • SEO & Digital Marketing (861)
    • Tech Tools & Mobile / Apps (1,707)
    • WiFi / Internet & Networking (234)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Palantir Has a Human Rights Policy. Its ICE Work Tells a Different Story

    April 21, 2026

    Vercel systems targeted after third-party tool compromised

    April 21, 2026

    The digital PR duplication method: Rinse, reuse, repeat

    April 21, 2026
    Most Popular
    • Palantir Has a Human Rights Policy. Its ICE Work Tells a Different Story
    • Vercel systems targeted after third-party tool compromised
    • The digital PR duplication method: Rinse, reuse, repeat
    • Valve’s new Linux VRAM fix almost triples framerates in some games on the 4GB Radeon RX 6500 XT
    • KelpDAO suffers $290 million heist tied to Lazarus hackers
    • WhatsApp’s paid subscription starts rolling out to some
    • Hackers Abuse QEMU for Defense Evasion
    • Winning Google Ads Campaign Structures For DTC Ecommerce
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.