Ethical Hacking News
New CrystalRAT malware has emerged with a unique blend of features, including remote access, data theft, keylogging, and clipboard hijacking capabilities, as well as prankware functionalities designed to annoy or disrupt users. As cybersecurity experts continue to monitor the situation, users are advised to exercise caution when interacting with online content and take proactive steps to protect themselves against this growing threat.
New CrystalRAT is a malware-as-a-service (MaaS) platform with features such as remote access, data theft, keylogging, and clipboard hijacking. The malware emerged in January with a tiered subscription model allowing users to purchase varying levels of functionality. It includes prankware features like changing desktop wallpapers and disabling input devices to annoy or disrupt users. The malware connects to a command-and-control (C2) server via WebSocket, enabling real-time control and data theft. New CrystalRAT is similar to WebRAT in terms of design, code, and functionality, highlighting the growing trend of MaaS platforms. Its prankware features pose risks to users who might interact with them or be tricked into installing the malware.
New CrystalRAT, a malware-as-a-service (MaaS) platform, has recently made waves in the cybersecurity community due to its unique blend of features that set it apart from other malware tools. According to recent reports by Kaspersky researchers, New CrystalRAT offers remote access, data theft, keylogging, and clipboard hijacking capabilities, as well as a plethora of prankware features designed to annoy users or disrupt their work.
The malware emerged in January with a tiered subscription model, which allowed users to purchase the service for various prices based on the level of functionality they desired. Apart from its Telegram channel promotion, New CrystalRAT was also showcased on YouTube through a dedicated marketing channel that highlighted its capabilities.
One of the most striking aspects of New CrystalRAT is its "fun" side, which includes features such as changing desktop wallpapers, altering display orientation to various angles, forcing system shutdowns, remapping mouse buttons, disabling input devices, showing fake notifications, and even hiding desktop icons. These prankware features seem designed to make the malware more appealing to novice or low-skilled threat actors who might be attracted by its user-friendly interface.
However, beneath its playful facade, New CrystalRAT poses a significant threat to users' security. The malware connects to a command-and-control (C2) server via WebSocket and sends information about the infected host for profiling and infection tracking purposes. This connection also enables attackers to execute commands via CMD, upload/download files, browse the file system, control the machine in real-time using built-in VNC, capture video and audio from the microphone, stream keystrokes in real-time to the C2, and use regular expressions to detect wallet addresses in the clipboard and replace them with ones provided by the attacker.
Kaspersky researchers have noted that New CrystalRAT's features are remarkably similar to those of WebRAT (Salat Stealer), including the same panel design, Go-based code, and a similar bot-based sales system. This similarity highlights the growing trend in malware-as-a-service platforms, which offer pre-packaged tools for various types of attacks.
Despite its growing popularity among malicious actors, New CrystalRAT's prankware features have sparked debate within the cybersecurity community about their potential impact on users' experience. While these features may serve as a distraction while the data theft modules run in the background, they also pose risks to users who might inadvertently interact with them or be tricked into installing the malware.
In light of these concerns, users are advised to exercise caution when interacting with online content and avoiding downloading software or media from untrusted sources. Furthermore, it is essential for organizations to implement robust security measures to protect their systems against such threats.
In conclusion, New CrystalRAT represents a significant threat to user security due to its extensive range of features, including both data theft capabilities and prankware functionalities. As the cybersecurity landscape continues to evolve, it is crucial that users remain vigilant and take proactive steps to safeguard themselves against emerging threats like this one.
Related Information:
https://www.ethicalhackingnews.com/articles/New-CrystalRAT-Malware-Brings-Prankware-Features-to-the-Table-ehn.shtml
https://www.bleepingcomputer.com/news/security/new-crystalrat-malware-adds-rat-stealer-and-prankware-features/
https://securelist.com/crystalx-rat-with-prankware-features/119283/
https://www.socinvestigation.com/comprehensive-list-of-apt-threat-groups-motives-and-attack-methods/
https://breach-hq.com/threat-actors
Published: Wed Apr 1 19:17:45 2026 by llama3.2 3B Q4_K_M