Ethical Hacking News
Threat actors are exploiting leaked Shellter tool licenses to spread Lumma Stealer and SectopRAT malware, highlighting the importance of cybersecurity awareness and vigilance in the face of evolving threats.
The Shellter tool is a popular red teaming tool used by offensive security teams to bypass antivirus and endpoint detection software. Leaked licenses of the Shellter tool are being exploited by threat actors to spread malware, including Lumma Stealer and SectopRAT. The malicious activity was first identified by Elastic Security Labs in April 2025. The attacks used self-modifying shellcode with polymorphic obfuscation to evade detection by antivirus software. The use of Shellter by threat actors is not an isolated incident, with other legitimate tools being exploited for malicious purposes. The Shellter Project criticized Elastic for prioritizing publicity over public safety and failing to notify them quickly.
The cybersecurity landscape is constantly evolving, with new threats and vulnerabilities emerging on a daily basis. In recent times, there has been a growing trend of threat actors exploiting legitimate tools for malicious purposes. This phenomenon was highlighted by the recent discovery of hackers using leaked Shellter tool licenses to spread Lumma Stealer and SectopRAT malware.
The Shellter tool is a popular red teaming tool used by offensive security teams to bypass antivirus and endpoint detection and response software installed on endpoints. The tool's capabilities make it an attractive target for threat actors looking to evade detection and propagate malicious payloads. In this case, the leaked licenses were obtained from a company that had recently purchased Shellter Elite licenses.
The malicious activity was first identified by Elastic Security Labs, which released a report detailing how the commercial evasion framework is being abused in the wild since April 2025 to propagate Lumma Stealer, Rhadamanthys Stealer, and SectopRAT (aka ArechClient2) malware. The attacks employed self-modifying shellcode with polymorphic obfuscation to embed themselves within legitimate programs, making it difficult for antivirus software to detect them.
The campaigns using Shellter were said to have been disseminated via payloads hosted on MediaFire in late April 2025. Some of the campaigns also adopted the tool after version 11 went up for sale on a popular cybercrime forum in mid-May, targeting content creators and YouTube video viewers with promises of gaming mods like Fortnite cheats.
The use of Shellter by threat actors is not an isolated incident. In recent times, there have been numerous instances of legitimate tools being exploited for malicious purposes. This includes the use of cracked versions of Cobalt Strike and Brute Ratel C4, which were previously found in the hands of cybercriminals and nation-state actors.
The Shellter Project has criticized Elastic for "prioritizing publicity over public safety" and for acting in a manner that it said was "reckless and unprofessional" by not notifying them quickly. The company behind Shellter stated that despite its rigorous vetting process, which had prevented such incidents since the launch of Shellter Pro Plus in February 2023, it now finds itself addressing this unfortunate situation.
The incident highlights the importance of vigilance in the cybersecurity community. As threat actors continue to exploit legitimate tools for malicious purposes, it is crucial that security professionals remain vigilant and proactive in mitigating these threats. The use of advanced technologies such as AI-powered threat detection systems can help identify and block malicious activity before it causes significant harm.
In conclusion, the recent Shellter tool malware scandal serves as a reminder of the importance of cybersecurity awareness and vigilance. As threat actors continue to evolve and exploit legitimate tools for malicious purposes, it is essential that security professionals stay ahead of the curve and develop effective strategies for mitigating these threats.
Related Information:
https://www.ethicalhackingnews.com/articles/The-Shellter-Tool-Malware-Scandal-A-Cautionary-Tale-of-Exploited-Legitimacy-ehn.shtml
https://thehackernews.com/2025/07/hackers-use-leaked-shellter-tool.html
Published: Tue Jul 8 15:00:55 2025 by llama3.2 3B Q4_K_M