Rhadamanthys 0.9.x – walk through the updates
Research by: hasherezade Highlights Introduction Rhadamanthys is a complex, multi-modular malware sold on the underground market since September 2022. It was first advertised by the actor “kingcrete2022.” From the outset, its design showed the hallmarks of experienced developers, and analysis soon revealed that it drew heavily from an earlier project by the same authors, Hidden […] The post Rhadamanthys 0.9.x – walk through the updates appeared first on Check Point Research .
AI Analysis
Technical Summary
Rhadamanthys 0.9.x is a complex malware strain first surfaced in underground markets in September 2022, attributed to the actor known as “kingcrete2022.” Its architecture is multi-modular, allowing attackers to deploy various components tailored to specific objectives such as espionage, data theft, or system disruption. The malware inherits design elements from a previous project by the same authors, called Hidden, indicating a lineage of development and refinement. The modularity facilitates stealth operations and evasion of traditional detection mechanisms by loading or unloading components as needed. Although no active exploits have been reported in the wild, the malware’s availability on underground markets suggests it could be leveraged by multiple threat actors. The technical analysis by Check Point Research highlights the malware’s sophisticated coding, use of obfuscation, and potential for persistence within victim environments. Rhadamanthys targets Windows systems primarily, with capabilities that may include credential theft, lateral movement, and command-and-control communications. Its deployment could severely impact targeted organizations by compromising sensitive data and disrupting operations. The malware’s complexity and modular design make it a significant threat requiring advanced detection and response capabilities.
Potential Impact
For European organizations, Rhadamanthys poses a substantial risk, particularly to sectors such as finance, telecommunications, energy, and government, where confidentiality and operational continuity are critical. The malware’s ability to stealthily infiltrate networks and deploy multiple payloads can lead to data breaches, intellectual property theft, and operational disruptions. Given Europe’s stringent data protection regulations like GDPR, a successful attack could also result in severe legal and financial consequences. The modular nature of Rhadamanthys means it can adapt to various attack scenarios, increasing the difficulty of detection and remediation. Furthermore, the lack of known exploits in the wild currently does not diminish the threat, as the malware’s presence on underground markets indicates potential future use against European targets. The impact extends beyond immediate technical damage to reputational harm and potential geopolitical ramifications if critical infrastructure is targeted.
Mitigation Recommendations
European organizations should implement targeted threat hunting for Rhadamanthys indicators, including monitoring for unusual modular malware behavior and command-and-control traffic patterns identified in the Check Point Research report. Network segmentation is critical to limit lateral movement within corporate environments. Employ advanced endpoint detection and response (EDR) solutions capable of identifying obfuscated and multi-stage malware components. Regularly update and patch Windows systems to reduce exploitation vectors, even though no direct exploits are known, as vulnerabilities may be leveraged in conjunction. Conduct employee awareness training focused on phishing and social engineering, common initial infection vectors for modular malware. Establish robust incident response plans that include containment strategies for modular malware infections. Collaborate with European cybersecurity information sharing organizations to stay informed about emerging Rhadamanthys activity and indicators of compromise. Finally, perform regular backups and verify their integrity to ensure recovery capability in case of ransomware or destructive payload deployment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Rhadamanthys 0.9.x – walk through the updates
Description
Research by: hasherezade Highlights Introduction Rhadamanthys is a complex, multi-modular malware sold on the underground market since September 2022. It was first advertised by the actor “kingcrete2022.” From the outset, its design showed the hallmarks of experienced developers, and analysis soon revealed that it drew heavily from an earlier project by the same authors, Hidden […] The post Rhadamanthys 0.9.x – walk through the updates appeared first on Check Point Research .
AI-Powered Analysis
Technical Analysis
Rhadamanthys 0.9.x is a complex malware strain first surfaced in underground markets in September 2022, attributed to the actor known as “kingcrete2022.” Its architecture is multi-modular, allowing attackers to deploy various components tailored to specific objectives such as espionage, data theft, or system disruption. The malware inherits design elements from a previous project by the same authors, called Hidden, indicating a lineage of development and refinement. The modularity facilitates stealth operations and evasion of traditional detection mechanisms by loading or unloading components as needed. Although no active exploits have been reported in the wild, the malware’s availability on underground markets suggests it could be leveraged by multiple threat actors. The technical analysis by Check Point Research highlights the malware’s sophisticated coding, use of obfuscation, and potential for persistence within victim environments. Rhadamanthys targets Windows systems primarily, with capabilities that may include credential theft, lateral movement, and command-and-control communications. Its deployment could severely impact targeted organizations by compromising sensitive data and disrupting operations. The malware’s complexity and modular design make it a significant threat requiring advanced detection and response capabilities.
Potential Impact
For European organizations, Rhadamanthys poses a substantial risk, particularly to sectors such as finance, telecommunications, energy, and government, where confidentiality and operational continuity are critical. The malware’s ability to stealthily infiltrate networks and deploy multiple payloads can lead to data breaches, intellectual property theft, and operational disruptions. Given Europe’s stringent data protection regulations like GDPR, a successful attack could also result in severe legal and financial consequences. The modular nature of Rhadamanthys means it can adapt to various attack scenarios, increasing the difficulty of detection and remediation. Furthermore, the lack of known exploits in the wild currently does not diminish the threat, as the malware’s presence on underground markets indicates potential future use against European targets. The impact extends beyond immediate technical damage to reputational harm and potential geopolitical ramifications if critical infrastructure is targeted.
Mitigation Recommendations
European organizations should implement targeted threat hunting for Rhadamanthys indicators, including monitoring for unusual modular malware behavior and command-and-control traffic patterns identified in the Check Point Research report. Network segmentation is critical to limit lateral movement within corporate environments. Employ advanced endpoint detection and response (EDR) solutions capable of identifying obfuscated and multi-stage malware components. Regularly update and patch Windows systems to reduce exploitation vectors, even though no direct exploits are known, as vulnerabilities may be leveraged in conjunction. Conduct employee awareness training focused on phishing and social engineering, common initial infection vectors for modular malware. Establish robust incident response plans that include containment strategies for modular malware infections. Collaborate with European cybersecurity information sharing organizations to stay informed about emerging Rhadamanthys activity and indicators of compromise. Finally, perform regular backups and verify their integrity to ensure recovery capability in case of ransomware or destructive payload deployment.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://research.checkpoint.com/2025/rhadamanthys-0-9-x-walk-through-the-updates/","fetched":true,"fetchedAt":"2025-10-07T01:30:33.285Z","wordCount":7339}
Threat ID: 68e46d3b6a45552f36e94e40
Added to database: 10/7/2025, 1:30:35 AM
Last enriched: 10/7/2025, 1:30:51 AM
Last updated: 10/7/2025, 6:55:42 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
GitHub Aims to Secure Supply Chain as NPM Hacks Ramp Up
HighNpm Package Hides Malware in Steganographic QR Codes
HighXWorm malware resurfaces with ransomware module, over 35 plugins
HighRhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography Payloads
HighDetour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.