October 2025 Infostealer Trend Report
The October 2025 Infostealer Trend Report highlights the ongoing and evolving threat posed by Infostealer malware families such as Rhadamanthys, ACRStealer, and LummaC2. Attackers have shifted distribution tactics, increasingly leveraging legitimate websites to evade detection and search engine restrictions, a technique known as SEO poisoning. A notable development is the mass distribution of a new Loader malware employing DLL sideloading to execute malicious payloads stealthily. The report also details changes in LummaC2 distribution patterns and the use of sophisticated disguise and phishing techniques to target companies. These Infostealers aim to exfiltrate sensitive information, posing risks to confidentiality and potentially enabling further attacks. The threat does not require known exploits or zero-day vulnerabilities but relies on social engineering and advanced evasion methods. European organizations are at risk due to the widespread use of affected malware and the targeting of companies via phishing. Mitigation requires proactive detection of DLL sideloading, monitoring for SEO poisoning campaigns, and enhanced phishing defenses.
AI Analysis
Technical Summary
This report from October 2025 provides a detailed analysis of Infostealer malware trends, focusing on the distribution volume, methods, and disguise techniques observed by AhnLab's automated detection systems. The most prevalent Infostealers identified are Rhadamanthys, ACRStealer, and LummaC2, which continue to be widely distributed. Attackers have evolved their distribution methods by exploiting legitimate websites to bypass search engine restrictions, a tactic known as SEO poisoning, which increases the likelihood of victims encountering malicious content. A significant trend is the emergence of a new Loader malware that uses DLL sideloading, a technique where a malicious DLL is loaded by a legitimate executable, allowing stealthy execution and evasion of traditional detection mechanisms. The report also notes changes in the distribution patterns of LummaC2, indicating adaptive tactics by threat actors. Phishing remains a key vector, with attackers using sophisticated disguise techniques to trick users into executing malware. The malware families involved employ various MITRE ATT&CK techniques such as T1071 (Application Layer Protocol), T1055 (Process Injection), T1102 (Web Service), T1059.001 (PowerShell), T1547.001 (Registry Run Keys/Startup Folder), T1027 (Obfuscated Files or Information), and T1204.001 (User Execution). The campaign does not rely on known exploits but rather on social engineering and advanced evasion, making detection challenging. Indicators of compromise include multiple file hashes and domains associated with the campaign. The threat landscape suggests a medium severity level due to the potential for data theft and operational disruption, combined with the ease of distribution and evasion techniques.
Potential Impact
For European organizations, this threat poses significant risks primarily to confidentiality, as Infostealers aim to exfiltrate sensitive data such as credentials, financial information, and intellectual property. The use of legitimate websites for distribution increases the risk of exposure, especially for organizations with employees who frequently access external web resources. The DLL sideloading Loader malware complicates detection and response, potentially allowing persistent footholds within networks. Phishing campaigns targeting companies can lead to initial compromise, lateral movement, and data breaches. The impact extends to operational integrity if stolen credentials are used for further attacks like ransomware or espionage. Industries with high-value data, such as finance, manufacturing, and logistics, are particularly vulnerable. The evolving tactics indicate that traditional signature-based defenses may be insufficient, requiring enhanced behavioral monitoring and threat intelligence integration. The medium severity reflects a balance between the sophistication of the attack methods and the absence of zero-day exploits, but the widespread distribution and potential for data loss remain concerning.
Mitigation Recommendations
European organizations should implement multi-layered defenses focusing on detection and prevention of DLL sideloading by monitoring for anomalous DLL loads by legitimate executables and employing application whitelisting where feasible. Enhance web filtering and DNS monitoring to detect and block access to domains involved in SEO poisoning campaigns and known malicious infrastructure. Deploy advanced email security solutions with phishing detection capabilities, including user training to recognize sophisticated disguise techniques and social engineering attempts. Utilize endpoint detection and response (EDR) tools to identify process injection and obfuscation behaviors associated with these Infostealers. Regularly update threat intelligence feeds with the provided indicators such as file hashes and domains to enable timely detection. Conduct periodic security assessments and phishing simulations to improve organizational resilience. Restrict use of PowerShell and other scripting environments to trusted administrators and monitor their usage closely. Finally, implement robust credential management and multi-factor authentication to limit the impact of stolen credentials.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
Indicators of Compromise
- hash: 0223b36e193979cf72ff7dae6d2493c7
- hash: 046a0e41374a937d30f6984a6b760b17
- hash: 145934077f8c72f43714a6dc1567aaa2
- hash: 158c6462ec5d3c9ea8066e6ee58d8861
- hash: 1813d31726e022f0ee97c9e278bc3eed
- hash: 558e748f99f5ca3c54ad425d2f3a4aa1ad67ca08
- hash: 7308cc1bf7aef791de90106195c70a310aa6da69
- hash: b116f9ac43debc50402950a21025d5da5950f76c
- hash: d661e3990c422884a63657d58bdf7d8687714d72
- hash: ffbd2a57bb130f76e4418bd70d0cc6c9567dd42b
- hash: 177a3e5599e6a845705eba5ffda4b228023e9150b9b100bfed596f48e99c6cbc
- hash: 239ec64b8c00bdc8603baaf441fc33bb14c14800051cf2d48d80345ff2966d9a
- hash: 381a973ed8a246d736f14be643616c79e19ea3b32b706ce48148d29492eabb8e
- hash: 8390aa85c1a686aa5d3384372479044a962b6435223e96b64cd56aa35fe4af08
- hash: e0748f6d9af223771ced811be0b904028d73d8e2ca9e399bc08af763866e1d00
- domain: evgshippingline.com
- domain: mijnplug.com
- domain: jpg.namaramalan.com
- domain: www.mirado.website
October 2025 Infostealer Trend Report
Description
The October 2025 Infostealer Trend Report highlights the ongoing and evolving threat posed by Infostealer malware families such as Rhadamanthys, ACRStealer, and LummaC2. Attackers have shifted distribution tactics, increasingly leveraging legitimate websites to evade detection and search engine restrictions, a technique known as SEO poisoning. A notable development is the mass distribution of a new Loader malware employing DLL sideloading to execute malicious payloads stealthily. The report also details changes in LummaC2 distribution patterns and the use of sophisticated disguise and phishing techniques to target companies. These Infostealers aim to exfiltrate sensitive information, posing risks to confidentiality and potentially enabling further attacks. The threat does not require known exploits or zero-day vulnerabilities but relies on social engineering and advanced evasion methods. European organizations are at risk due to the widespread use of affected malware and the targeting of companies via phishing. Mitigation requires proactive detection of DLL sideloading, monitoring for SEO poisoning campaigns, and enhanced phishing defenses.
AI-Powered Analysis
Technical Analysis
This report from October 2025 provides a detailed analysis of Infostealer malware trends, focusing on the distribution volume, methods, and disguise techniques observed by AhnLab's automated detection systems. The most prevalent Infostealers identified are Rhadamanthys, ACRStealer, and LummaC2, which continue to be widely distributed. Attackers have evolved their distribution methods by exploiting legitimate websites to bypass search engine restrictions, a tactic known as SEO poisoning, which increases the likelihood of victims encountering malicious content. A significant trend is the emergence of a new Loader malware that uses DLL sideloading, a technique where a malicious DLL is loaded by a legitimate executable, allowing stealthy execution and evasion of traditional detection mechanisms. The report also notes changes in the distribution patterns of LummaC2, indicating adaptive tactics by threat actors. Phishing remains a key vector, with attackers using sophisticated disguise techniques to trick users into executing malware. The malware families involved employ various MITRE ATT&CK techniques such as T1071 (Application Layer Protocol), T1055 (Process Injection), T1102 (Web Service), T1059.001 (PowerShell), T1547.001 (Registry Run Keys/Startup Folder), T1027 (Obfuscated Files or Information), and T1204.001 (User Execution). The campaign does not rely on known exploits but rather on social engineering and advanced evasion, making detection challenging. Indicators of compromise include multiple file hashes and domains associated with the campaign. The threat landscape suggests a medium severity level due to the potential for data theft and operational disruption, combined with the ease of distribution and evasion techniques.
Potential Impact
For European organizations, this threat poses significant risks primarily to confidentiality, as Infostealers aim to exfiltrate sensitive data such as credentials, financial information, and intellectual property. The use of legitimate websites for distribution increases the risk of exposure, especially for organizations with employees who frequently access external web resources. The DLL sideloading Loader malware complicates detection and response, potentially allowing persistent footholds within networks. Phishing campaigns targeting companies can lead to initial compromise, lateral movement, and data breaches. The impact extends to operational integrity if stolen credentials are used for further attacks like ransomware or espionage. Industries with high-value data, such as finance, manufacturing, and logistics, are particularly vulnerable. The evolving tactics indicate that traditional signature-based defenses may be insufficient, requiring enhanced behavioral monitoring and threat intelligence integration. The medium severity reflects a balance between the sophistication of the attack methods and the absence of zero-day exploits, but the widespread distribution and potential for data loss remain concerning.
Mitigation Recommendations
European organizations should implement multi-layered defenses focusing on detection and prevention of DLL sideloading by monitoring for anomalous DLL loads by legitimate executables and employing application whitelisting where feasible. Enhance web filtering and DNS monitoring to detect and block access to domains involved in SEO poisoning campaigns and known malicious infrastructure. Deploy advanced email security solutions with phishing detection capabilities, including user training to recognize sophisticated disguise techniques and social engineering attempts. Utilize endpoint detection and response (EDR) tools to identify process injection and obfuscation behaviors associated with these Infostealers. Regularly update threat intelligence feeds with the provided indicators such as file hashes and domains to enable timely detection. Conduct periodic security assessments and phishing simulations to improve organizational resilience. Restrict use of PowerShell and other scripting environments to trusted administrators and monitor their usage closely. Finally, implement robust credential management and multi-factor authentication to limit the impact of stolen credentials.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://asec.ahnlab.com/en/91062"]
- Adversary
- null
- Pulse Id
- 691f29a1fb65b42a9f9f4e0e
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash0223b36e193979cf72ff7dae6d2493c7 | — | |
hash046a0e41374a937d30f6984a6b760b17 | — | |
hash145934077f8c72f43714a6dc1567aaa2 | — | |
hash158c6462ec5d3c9ea8066e6ee58d8861 | — | |
hash1813d31726e022f0ee97c9e278bc3eed | — | |
hash558e748f99f5ca3c54ad425d2f3a4aa1ad67ca08 | — | |
hash7308cc1bf7aef791de90106195c70a310aa6da69 | — | |
hashb116f9ac43debc50402950a21025d5da5950f76c | — | |
hashd661e3990c422884a63657d58bdf7d8687714d72 | — | |
hashffbd2a57bb130f76e4418bd70d0cc6c9567dd42b | — | |
hash177a3e5599e6a845705eba5ffda4b228023e9150b9b100bfed596f48e99c6cbc | — | |
hash239ec64b8c00bdc8603baaf441fc33bb14c14800051cf2d48d80345ff2966d9a | — | |
hash381a973ed8a246d736f14be643616c79e19ea3b32b706ce48148d29492eabb8e | — | |
hash8390aa85c1a686aa5d3384372479044a962b6435223e96b64cd56aa35fe4af08 | — | |
hashe0748f6d9af223771ced811be0b904028d73d8e2ca9e399bc08af763866e1d00 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainevgshippingline.com | — | |
domainmijnplug.com | — | |
domainjpg.namaramalan.com | — | |
domainwww.mirado.website | — |
Threat ID: 691f9295b342c1dca420b68d
Added to database: 11/20/2025, 10:13:41 PM
Last enriched: 11/20/2025, 10:24:56 PM
Last updated: 11/21/2025, 5:44:51 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
WhatsApp compromise leads to Astaroth deployment
MediumNKNShell Malware Distributed via VPN Website
MediumOctober 2025 Trends Report on Phishing Emails
MediumMobile Banking Malware bypassing WhatsApp, Telegram and Signal Encryption
MediumPivot to Multi-Vector Attacks
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.