Skip to content
Up To Date Time

Up To Date Time

  • Home
  • Sports
  • cryptocurrency
  • Technology
  • Virtual Reality
  • Education Law
  • More
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
  • Toggle search form
Global UpCrypter Phishing Attack is Expanding

Global UpCrypter Phishing Attack is Expanding

Posted on August 29, 2025 By rehan.rafique No Comments on Global UpCrypter Phishing Attack is Expanding

A computer screen with program code warning of a detected malware script program.
Image: James Thew/Adobe Stock

Cybersecurity researchers have identified a surge of phishing emails targeting Microsoft Windows devices. Fortinet’s FortiGuard Labs tracks activity related to UpCrypter, a loader designed to install multiple types of remote access tools (RATs) that enable attackers to maintain prolonged access to compromised machines.

The phishing emails arrive disguised as missed voicemails or purchase orders. Victims who click on the attachments are redirected to fake websites, designed to appear convincing, often featuring company logos to increase trust.

According to Fortinet, these phishing pages prompt users to download a ZIP file containing a heavily disguised JavaScript dropper. Once opened, the script triggers PowerShell commands in the background that connect to attacker-controlled servers for the next stage of malware.

“These pages are designed to entice recipients into downloading JavaScript files that act as droppers for UpCrypter,” said Cara Lin, a Fortinet FortiGuard Labs researcher.

1
ESET PROTECT Advanced

Employees per Company Size

Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+)

Any Company Size
Any Company Size

Features

Activity Monitoring, Antivirus, Blacklisting, and more

2
Graylog

Employees per Company Size

Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+)

Medium (250-999 Employees), Large (1,000-4,999 Employees), Enterprise (5,000+ Employees)
Medium, Large, Enterprise

Features

Activity Monitoring, Dashboard, Notifications

3
ManageEngine Desktop Central

Employees per Company Size

Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+)

Any Company Size
Any Company Size

Features

Activity Monitoring, Antivirus, Dashboard, and more

UpCrypter’s role in the attack chain

Once executed, UpCrypter scans the system to see if it is being analyzed in a sandbox or by forensic tools. If such monitoring is detected, the loader forces a reboot to break the investigation.

If no obstacles are found, the malware proceeds to download and run further payloads. In some cases, attackers conceal these files inside images through steganography, a tactic that helps bypass antivirus software detection.

The final malware deployed includes:

  • PureHVNC, which allows hidden remote desktop access.
  • DCRat (DarkCrystal RAT), a multifunction tool for spying and data theft.
  • Babylon RAT, which enables attackers to control a device fully.

Fortinet researchers noted that the attackers employ multiple methods to disguise malicious code, including string obfuscation, altering registry settings for persistence, and running code in-memory to prevent leaving traces on the disk.

Must-read security coverage

Global spread and affected sectors

The phishing campaign has been active since early August 2025 and has shown international reach, with high activity observed in Austria, Belarus, Canada, Egypt, India, and Pakistan.

The sectors hit hardest so far include manufacturing, technology, healthcare, construction, and retail/hospitality. Fortinet researchers also observed that detections doubled in just two weeks, demonstrating the rapid expansion of the operation.

This attack goes beyond stealing usernames and passwords; instead, it delivers a chain of malware designed to remain hidden within corporate systems for extended periods.

As Fortinet concluded, “Users and organizations should take this threat seriously, use strong email filters, and make sure staff are trained to recognize and avoid these types of attacks.”

Learn more from our detailed breakdown of Check Point’s report on escalating cyberattacks and how to stay protected in this shifting security climate.

Technology

Post navigation

Previous Post: Alex Baskin Calls Jax Taylor’s Backlash A ‘Good Thing’ For The Star
Next Post: Big interview with Kyle Riesenbeck about Upload VR, the XR space, the “good old days”, and more!

More Related Articles

Boss Says “I’m Never Going To Say Never” Hints At Season 2 Boss Says “I’m Never Going To Say Never” Hints At Season 2 Technology
Alex Baskin Calls Jax Taylor’s Backlash A ‘Good Thing’ For The Star Alex Baskin Calls Jax Taylor’s Backlash A ‘Good Thing’ For The Star Technology
The Nintendo Switch 2 Rumors and Leaks Won’t Change Anything The Nintendo Switch 2 Rumors and Leaks Won’t Change Anything Technology
Block ads everywhere with AdGuard for iOS | by JJ Block ads everywhere with AdGuard for iOS | by JJ Technology
Blueant X5i review – Take the party with you Blueant X5i review – Take the party with you Technology
Why Enterprise Application Development Services Are Essential for Business Growth Why Enterprise Application Development Services Are Essential for Business Growth Technology

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Big interview with Kyle Riesenbeck about Upload VR, the XR space, the “good old days”, and more!
  • Global UpCrypter Phishing Attack is Expanding
  • Alex Baskin Calls Jax Taylor’s Backlash A ‘Good Thing’ For The Star
  • Cashing Out Your NFT Gains
  • Meta’s Reported $800 Smart Glasses with Display Won’t Shoot for the Stars, Claims Respected Analyst

Categories

  • cryptocurrency
  • Education Law
  • Sports
  • Technology
  • Virtual Reality

Copyright © 2025 Up To Date Time.

Powered by PressBook Blog WordPress theme