Rhadamanthys Stealer Available on Dark Web for $299–$499

Published:

spot_img

Rhadamanthys: The Rise of a New Malware-as-a-Service

Introduction to Rhadamanthys

A new entity in the world of malware has emerged, named Rhadamanthys. This sophisticated information-stealing tool has made its presence known on underground marketplaces, with subscriptions priced between $299 and $499 per month. Its refined branding and tiered pricing suggest it’s designed for seasoned cybercriminals rather than novices.

A Rapidly Evolving Threat

Since its introduction in September 2022 under the alias kingcrete2022, Rhadamanthys has quickly advanced from a basic experimental project into one of the most feature-packed stealers on the dark web. Initially built using code from an earlier malware known as Hidden Bee, the creators have made significant improvements. These include a modular architecture that delivers custom loaders, enhanced obfuscation techniques, and adaptable deployment methods.

Delivery Methods of Malware

In its early iterations, Rhadamanthys utilized WAV or JPEG formats to conceal its malware payloads. However, the most recent version, v0.9.2, has shifted to a more straightforward delivery mechanism. This version embeds encrypted modules within PNG images, making detection and interception more difficult.

The Sophistication of Rhadamanthys

Adopting a professional software house model, Rhadamanthys comes equipped with a dedicated Tor-hosted storefront, Telegram support channels, and distinct branding elements such as RHAD Security and Mythical Origin Labs. Its online presence is aimed at establishing a comprehensive cybercriminal ecosystem, offering not just the main stealer but supplementary tools like the Elysium Proxy Bot and Crypt Service.

Tiered Subscription Model

The operators of Rhadamanthys offer three distinct pricing tiers:

  1. Self-Hosted Package: At $299 per month, this option allows users to deploy the malware on their existing infrastructure, appealing to those who prefer minimal reliance on external services.

  2. Managed Server Subscription: Priced at $499 per month, this mid-tier package comes with rented servers managed by the developers, as well as automated updates and prioritized tech support.

  3. Enterprise Package: Tailored to specific needs through negotiations, this package promises unique features, service-level agreements, and dedicated support.

This subscription-based model is quite rare among malware offerings, which often come as one-off purchases. Rhadamanthys blends cybersecurity sophistication with a software-as-a-service approach, indicating a professional aesthetic that may attract established cybercriminal organizations.

Technical Composition of Rhadamanthys

The technical underpinnings of Rhadamanthys add layers of complexity and security. It employs a 16-byte seed value to generate mutex names, ensuring streamlined operations.

Recent enhancements include:

  • A user-friendly message box designed to imitate the renowned Lumma stealer interface, complicating analysis during malware unpacking.
  • The introduction of custom executable formats (XS1B and XS2B), replacing standard structures to outsmart automation tools.
  • New string deobfuscation methods using RC4 instead of traditional XOR routines.

Evasion Techniques

Rhadamanthys is equipped with a sophisticated “Strategy” module that can adapt to sandbox detection protocols, checking against various hardware and software configurations often associated with analysis environments. Additionally, its mutex collection utilizes a randomized seed to evade universal detection tools, while time synchronization with public Network Time Protocol (NTP) servers keeps its operations discreet.

The malware also collects essential data including credentials, browser cookies, wallet information, and more, all while operating hidden within legitimate processes, thereby complicating detection strategies significantly.

Conclusion: A Growing Trend in Cybercrime

With its subscription fees and continual updates, Rhadamanthys exemplifies a shift toward malware-as-a-service offerings that adopt features typical of legitimate businesses. Security teams are strongly urged to update their defense mechanisms to include detection tools tailored for PNG-based payloads and to remain alert to evolving obfuscation strategies.

As Rhadamanthys becomes a persistent revenue stream for its creators, there is a pressing need for vigilance and innovation in cybersecurity practices to counteract its advancing features in future releases.

spot_img

Related articles

Recent articles

Researchers Unveil 13-Year-Old Redis Flaw Affecting 330,000 Instances

Redis Vulnerability: What You Need to Know About the Critical Flaw Overview of the Redis Vulnerability A significant security flaw has been discovered in Redis, a...

UAE’s Space Sector Launches with $12 Billion Investment and Private Sector Boost

UAE's Bold Investment in Space: A Growing Partnership with the Private Sector The United Arab Emirates (UAE) is making significant strides in its burgeoning space...

Microsoft Attributes Recent GoAnywhere MFT Exploitation to Medusa Ransomware Group

Microsoft Links GoAnywhere MFT Exploitation to Medusa Ransomware Group Overview of the Situation Recent investigations by Microsoft reveal an alarming situation involving the exploitation of a...

Critical CVSS 10.0 Vulnerability Allows Remote Code Execution by Attackers

October 7, 2025Ravie LakshmananVulnerability / Cloud Security Critical Redis Security Vulnerability Uncovered Recent developments in cloud security have brought to light a serious vulnerability in Redis,...