Skip to content
Up To Date Time

Up To Date Time

  • Home
  • Sports
  • cryptocurrency
  • Technology
  • Virtual Reality
  • Education Law
  • More
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
  • Toggle search form
Global UpCrypter Phishing Attack is Expanding

Global UpCrypter Phishing Attack is Expanding

Posted on August 29, 2025 By rehan.rafique No Comments on Global UpCrypter Phishing Attack is Expanding

A computer screen with program code warning of a detected malware script program.
Image: James Thew/Adobe Stock

Cybersecurity researchers have identified a surge of phishing emails targeting Microsoft Windows devices. Fortinet’s FortiGuard Labs tracks activity related to UpCrypter, a loader designed to install multiple types of remote access tools (RATs) that enable attackers to maintain prolonged access to compromised machines.

The phishing emails arrive disguised as missed voicemails or purchase orders. Victims who click on the attachments are redirected to fake websites, designed to appear convincing, often featuring company logos to increase trust.

According to Fortinet, these phishing pages prompt users to download a ZIP file containing a heavily disguised JavaScript dropper. Once opened, the script triggers PowerShell commands in the background that connect to attacker-controlled servers for the next stage of malware.

“These pages are designed to entice recipients into downloading JavaScript files that act as droppers for UpCrypter,” said Cara Lin, a Fortinet FortiGuard Labs researcher.

1
ESET PROTECT Advanced

Employees per Company Size

Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+)

Any Company Size
Any Company Size

Features

Activity Monitoring, Antivirus, Blacklisting, and more

2
Graylog

Employees per Company Size

Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+)

Medium (250-999 Employees), Large (1,000-4,999 Employees), Enterprise (5,000+ Employees)
Medium, Large, Enterprise

Features

Activity Monitoring, Dashboard, Notifications

3
ManageEngine Desktop Central

Employees per Company Size

Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+)

Any Company Size
Any Company Size

Features

Activity Monitoring, Antivirus, Dashboard, and more

UpCrypter’s role in the attack chain

Once executed, UpCrypter scans the system to see if it is being analyzed in a sandbox or by forensic tools. If such monitoring is detected, the loader forces a reboot to break the investigation.

If no obstacles are found, the malware proceeds to download and run further payloads. In some cases, attackers conceal these files inside images through steganography, a tactic that helps bypass antivirus software detection.

The final malware deployed includes:

  • PureHVNC, which allows hidden remote desktop access.
  • DCRat (DarkCrystal RAT), a multifunction tool for spying and data theft.
  • Babylon RAT, which enables attackers to control a device fully.

Fortinet researchers noted that the attackers employ multiple methods to disguise malicious code, including string obfuscation, altering registry settings for persistence, and running code in-memory to prevent leaving traces on the disk.

Must-read security coverage

Global spread and affected sectors

The phishing campaign has been active since early August 2025 and has shown international reach, with high activity observed in Austria, Belarus, Canada, Egypt, India, and Pakistan.

The sectors hit hardest so far include manufacturing, technology, healthcare, construction, and retail/hospitality. Fortinet researchers also observed that detections doubled in just two weeks, demonstrating the rapid expansion of the operation.

This attack goes beyond stealing usernames and passwords; instead, it delivers a chain of malware designed to remain hidden within corporate systems for extended periods.

As Fortinet concluded, “Users and organizations should take this threat seriously, use strong email filters, and make sure staff are trained to recognize and avoid these types of attacks.”

Learn more from our detailed breakdown of Check Point’s report on escalating cyberattacks and how to stay protected in this shifting security climate.

Technology

Post navigation

Previous Post: Alex Baskin Calls Jax Taylor’s Backlash A ‘Good Thing’ For The Star

More Related Articles

Importance of Artificial Intelligence – Technology Importance of Artificial Intelligence – Technology Technology
Project Management Body of Knowledge Guide Project Management Body of Knowledge Guide Technology
What is SSD or Solid-State Drives? A Comprehensive Guide! What is SSD or Solid-State Drives? A Comprehensive Guide! Technology
Fake Android apps are being used to steal cryptocurrency wallets Fake Android apps are being used to steal cryptocurrency wallets Technology
You Asked: What’s the most impressive thing you saw at CES? You Asked: What’s the most impressive thing you saw at CES? Technology
Behold Agatha All Along’s Coven of Chaos in a Series of New Character Posters Behold Agatha All Along’s Coven of Chaos in a Series of New Character Posters Technology

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Global UpCrypter Phishing Attack is Expanding
  • Alex Baskin Calls Jax Taylor’s Backlash A ‘Good Thing’ For The Star
  • Cashing Out Your NFT Gains
  • Meta’s Reported $800 Smart Glasses with Display Won’t Shoot for the Stars, Claims Respected Analyst
  • Washington Parents: Do you know about ALE?

Categories

  • cryptocurrency
  • Education Law
  • Sports
  • Technology
  • Virtual Reality

Copyright © 2025 Up To Date Time.

Powered by PressBook Blog WordPress theme