Ethical Hacking News
Microsoft has warned about a campaign that uses trojanized gaming utilities to deliver a stealthy Remote Access Trojan (RAT). The malicious campaign lured users into running trojanized versions of popular gaming tools, such as Xeno.exe and RobloxPlayerBeta.exe, through browsers and chat platforms. These malicious utilities were designed to evade detection by traditional security software and deploy a multi-purpose malware that acted as a loader, runner, downloader, and RAT. The campaign used stealthy tactics, including PowerShell and LOLBins, to avoid detection and delivered the final payload via a C2 communication.
Microsoft warns about a campaign using trojanized gaming utilities to deliver stealthy RATs. The malicious campaign was detected by Microsoft Defender researchers and included indicators of compromise (IoCs) such as IP address 79.110.49[.]15. Exploited vulnerabilities include a critical PTX router RCE, Google Chromium CSS, and Microsoft Windows flaws. Users should keep software up-to-date and use reputable security software to detect and block malicious activities. Be cautious when running unknown or unverified applications, especially in gaming environments.
Microsoft has issued a warning about a campaign that uses trojanized gaming utilities to deliver a stealthy Remote Access Trojan (RAT). The malicious campaign, which was uncovered by the Microsoft Threat Intelligence team, lured users into running trojanized versions of popular gaming tools, such as Xeno.exe and RobloxPlayerBeta.exe, through browsers and chat platforms. These malicious utilities were designed to evade detection by traditional security software and deploy a multi-purpose malware that acted as a loader, runner, downloader, and RAT.
The campaign used a combination of stealthy tactics to avoid detection, including the use of PowerShell and LOLBins (Logical Operations Link Binaries) to create a malicious downloader. This downloader was deployed using a portable Java runtime to run a harmful JAR file, which ultimately delivered the final payload - a multi-purpose malware that connected to an IP address for command and control (C2). The C2 communication enabled threat actors to perform various actions such as data theft and additional payload deployment.
The malicious campaign was detected by Microsoft Defender researchers, who uncovered indicators of compromise (IoCs) for this specific threat actor. These IoCs included the IP address 79.110.49[.]15, which was used by the C2 communication.
Furthermore, Microsoft also identified several vulnerabilities that were exploited in this campaign, including a critical PTX router RCE (Remote Code Execution), which was patched by Juniper as an emergency measure. Additionally, Google Chromium CSS and Microsoft Windows flaws were added to the Known Exploited Vulnerabilities catalog by the U.S. CISA (Cybersecurity and Infrastructure Security Agency).
The use of trojanized gaming utilities as a vector for stealthy RAT deployment highlights the evolving tactics, techniques, and procedures (TTPs) used by threat actors to evade detection and achieve their malicious goals. As the cybersecurity landscape continues to evolve, it is essential for users and organizations to remain vigilant and take proactive measures to protect themselves against these types of threats.
The incident also underscores the importance of keeping software up-to-date and using reputable security software that can detect and block malicious activities. Additionally, users should be cautious when running unknown or unverified applications, especially those that are packaged in a gaming environment, as they may contain hidden malware.
In conclusion, the Microsoft warning about trojanized gaming utilities as a vector for stealthy RAT deployment serves as a reminder of the ever-evolving threats faced by the cybersecurity community. As threat actors continue to adapt and innovate their tactics, it is essential for organizations and individuals to stay informed and take proactive measures to protect themselves against these types of threats.
Related Information:
https://www.ethicalhackingnews.com/articles/Microsoft-Warns-of-Trojanized-Gaming-Utilities-as-a-Vector-for-Stealthy-RAT-Deployment-ehn.shtml
https://securityaffairs.com/188639/uncategorized/microsoft-warns-of-rat-delivered-through-trojanized-gaming-utilities.html
https://cybersecuritynews.com/microsoft-defender-uncovers-trojanized-gaming-utility-campaign/
https://any.run/report/0d110bb87d798b175462be94309b0582d0633b059252e015b9f2e338e4b68d34/2f764d23-3d2b-4b77-aefe-b4913d5f5d1c
https://www.joesandbox.com/analysis/1789147/0/executive
https://malwaretips.com/blogs/robloxplayerbeta-exe-what-it-is-should-i-remove-it/
https://any.run/report/79e062b0eeaaa83763937fcb93082a2acbe1be12b60174f7890c889b5bb780bf/419572f4-4b05-4924-b4aa-6c1e3e493236
Published: Sat Feb 28 03:13:28 2026 by llama3.2 3B Q4_K_M