Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Rhadamanthys 0.9.x – walk through the updates

0
High
Malware
Published: Wed Oct 01 2025 (10/01/2025, 08:32:37 UTC)
Source: Check Point Research

Description

Research by: hasherezade Highlights Introduction Rhadamanthys is a complex, multi-modular malware sold on the underground market since September 2022. It was first advertised by the actor “kingcrete2022.” From the outset, its design showed the hallmarks of experienced developers, and analysis soon revealed that it drew heavily from an earlier project by the same authors, Hidden […] The post Rhadamanthys 0.9.x – walk through the updates appeared first on Check Point Research .

AI-Powered Analysis

AILast updated: 10/07/2025, 01:30:51 UTC

Technical Analysis

Rhadamanthys 0.9.x is a complex malware strain first surfaced in underground markets in September 2022, attributed to the actor known as “kingcrete2022.” Its architecture is multi-modular, allowing attackers to deploy various components tailored to specific objectives such as espionage, data theft, or system disruption. The malware inherits design elements from a previous project by the same authors, called Hidden, indicating a lineage of development and refinement. The modularity facilitates stealth operations and evasion of traditional detection mechanisms by loading or unloading components as needed. Although no active exploits have been reported in the wild, the malware’s availability on underground markets suggests it could be leveraged by multiple threat actors. The technical analysis by Check Point Research highlights the malware’s sophisticated coding, use of obfuscation, and potential for persistence within victim environments. Rhadamanthys targets Windows systems primarily, with capabilities that may include credential theft, lateral movement, and command-and-control communications. Its deployment could severely impact targeted organizations by compromising sensitive data and disrupting operations. The malware’s complexity and modular design make it a significant threat requiring advanced detection and response capabilities.

Potential Impact

For European organizations, Rhadamanthys poses a substantial risk, particularly to sectors such as finance, telecommunications, energy, and government, where confidentiality and operational continuity are critical. The malware’s ability to stealthily infiltrate networks and deploy multiple payloads can lead to data breaches, intellectual property theft, and operational disruptions. Given Europe’s stringent data protection regulations like GDPR, a successful attack could also result in severe legal and financial consequences. The modular nature of Rhadamanthys means it can adapt to various attack scenarios, increasing the difficulty of detection and remediation. Furthermore, the lack of known exploits in the wild currently does not diminish the threat, as the malware’s presence on underground markets indicates potential future use against European targets. The impact extends beyond immediate technical damage to reputational harm and potential geopolitical ramifications if critical infrastructure is targeted.

Mitigation Recommendations

European organizations should implement targeted threat hunting for Rhadamanthys indicators, including monitoring for unusual modular malware behavior and command-and-control traffic patterns identified in the Check Point Research report. Network segmentation is critical to limit lateral movement within corporate environments. Employ advanced endpoint detection and response (EDR) solutions capable of identifying obfuscated and multi-stage malware components. Regularly update and patch Windows systems to reduce exploitation vectors, even though no direct exploits are known, as vulnerabilities may be leveraged in conjunction. Conduct employee awareness training focused on phishing and social engineering, common initial infection vectors for modular malware. Establish robust incident response plans that include containment strategies for modular malware infections. Collaborate with European cybersecurity information sharing organizations to stay informed about emerging Rhadamanthys activity and indicators of compromise. Finally, perform regular backups and verify their integrity to ensure recovery capability in case of ransomware or destructive payload deployment.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://research.checkpoint.com/2025/rhadamanthys-0-9-x-walk-through-the-updates/","fetched":true,"fetchedAt":"2025-10-07T01:30:33.285Z","wordCount":7339}

Threat ID: 68e46d3b6a45552f36e94e40

Added to database: 10/7/2025, 1:30:35 AM

Last enriched: 10/7/2025, 1:30:51 AM

Last updated: 10/7/2025, 6:55:42 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats