<img src="https://ws.zoominfo.com/pixel/csEHmvjEA1iScHExXGZE" width="1" height="1" style="display: none;">

The Week in Review from Stamus Labs

Welcome to the weekly threat detection update report from Stamus Networks. Each week, you will receive this email with a summary of the updates.

 

Current Stamus Threat Intelligence (STI) release version: 1629

 

This week, in addition to daily ruleset and IOC updates, we provided Stamus Security Platform customers with the following improved defense(s):

  • New threat detection(s) added [1]: 6 (LucidRook, XorBee, ShadowLink, TA2725, DonutLoader, VENOM PhaaS)

  • Major changes to detections(s) [2]: 149

  • Updated threat detection(s) [3]: 204

 

Note: a "method" as referenced below, is a discrete detection vector for a given threat.

 

New Threat(s) Detected

The following detections were added to your Clear NDR this past week:

 

LucidRook (Trojan)

LucidRook is advanced malware using Lua interpreter and Rust-compiled libraries in a DLL to download Lua bytecode payloads. LucidPawn drops it, with Taiwan-focused execution, via infected files and compromises servers for C2 communication.

  • Total number of detection methods: 2

  • Kill chain phase(s): actions on objectives, delivery

  • MITRE ATT&CK: T1071

 

XorBee (RAT)

KongTuke malware infects legitimate websites, uses ClickFix to run XorBee RAT on Windows domain joined devices. XorBee RAT is a Python-based reverse shell for executing Powershell commands on victim's computer. Targeted at organizational victims.

  • Total number of detection methods: 13

  • Kill chain phase(s): command and control

  • MITRE ATT&CK: T1041

 

ShadowLink (Botnet)

Tplink_stager.sh payload exploits CVE-2024-21833 on TP-Link routers, detects architecture, sets up SOCKS5 proxy using microsocks binary, and deploys ShadowLink beacon for post-exploitation. More info at Ctrlaltintel.

  • Total number of detection methods: 5

  • Kill chain phase(s): command and control, installation

  • MITRE ATT&CK: T1041

 

TA2725 (APT)

TA2725 is a threat actor targeting organizations in Brazil, Mexico, Spain using Brazilian banking malware and phishing. They use GoDaddy virtual hosting, Amazon AWS, Google Cloud, Microsoft Azure for malicious files.

  • Total number of detection methods: 1

  • Kill chain phase(s): command and control

  • MITRE ATT&CK: T1071

 

DonutLoader (Loader)

Donut is position-independent code for in-memory execution of various file types. Features include encryption, compression, API hash and string generation, PE header manipulation, and patching of security measures.

DonutLoader - Malpedia |
  • Total number of detection methods: 1

  • Kill chain phase(s): delivery

 

VENOM PhaaS (Phishing)

Credential theft campaign targets C-suite executives with personalized phishing emails impersonating SharePoint notifications, using a new platform called VENOM. VENOM is not publicly known or accessible through typical channels.

  • Total number of detection methods: 33

  • Kill chain phase(s): delivery

  • MITRE ATT&CK: T1557

 

Major Detection Changes

The following detections were updated this past week with changes to kill chain phase(s) or MITRE ATT&CK tactic(s)/technique(s):

 

Command and Control (Generic CnC)

Adversaries may use custom command and control protocols to communicate, mimicking or developing protocols on top of standard network stacks, instead of using existing Standard Application Layer Protocols.

  • Added kill chain phase(s): command and control, actions on objectives

  • Previously supported kill chain phase(s): command and control, actions on objectives, delivery, installation

  • MITRE ATT&CK added: T1041

  • Previously existing MITRE ATT&CK: T1071, T1587, T1573, T1566, T1486, T1496, T1041

  • Methods added: 6

 

Fake Browser (Trojan)

Attackers infect enterprise networks with malware by promoting fake browser updates on hacked websites, leading to the installation of banking trojans and later ransomware encryption on compromised networks.

  • Added kill chain phase(s): exploitation

  • Previously supported kill chain phase(s): delivery, exploitation, command and control

  • MITRE ATT&CK added: T1189

  • Previously existing MITRE ATT&CK: T1071, T1189

  • Methods added: 21

 

LandUpdate808 (Trojan)

Fake update variants like SocGholish, Clear Fake, Smart Ape, and ClickFix are being tracked by a collaboration introducing the LandUpdate808 Fake Update Variant.

  • Added kill chain phase(s): command and control, exploitation, actions on objectives

  • Previously supported kill chain phase(s): delivery, command and control

  • MITRE ATT&CK added: T1189, T1071

  • Previously existing MITRE ATT&CK: T1189, T1105, T1071

  • Methods added: 37

 

Lumma (Data Theft)

Lumma is a C-based information stealer sold on Russian underground forums and Telegram by LummaC since August 2022. It targets cryptocurrency wallets and has file grabber capabilities.

  • Added kill chain phase(s): command and control, actions on objectives

  • Previously supported kill chain phase(s): actions on objectives, command and control, installation, delivery

  • MITRE ATT&CK added: T1071

  • Previously existing MITRE ATT&CK: T1005, T1071, T1573, T1105

  • Methods added: 45

 

NetSupport RAT (RAT)

Remote Access Trojans allow covert surveillance and unauthorized access to victim PCs, collecting keystrokes, passwords, screenshots, and more. They differ from keyloggers by providing remote access capabilities to attackers.

  • Added kill chain phase(s): command and control

  • Previously supported kill chain phase(s): actions on objectives, command and control, exploitation, installation

  • MITRE ATT&CK added: T1105

  • Previously existing MITRE ATT&CK: T1071, T1105

  • Methods added: 3

 

SocGholish (Social Engineering)

Malwarebytes found a new social engineering toolkit that uses compromised websites to perform advanced fingerprinting checks and deliver the NetSupport RAT payload.

  • Added kill chain phase(s): command and control

  • Previously supported kill chain phase(s): command and control, exploitation, delivery, reconnaissance, actions on objectives

  • Methods added: 15

 

Stealer and Exfiltration (Data Theft)

Info stealers gather sensitive data on infected computers to send to attackers, typically targeting online banking, social media, email, and FTP accounts. They use various methods including hooking browsers and keylogging.

  • Added kill chain phase(s): actions on objectives, command and control

  • Previously supported kill chain phase(s): actions on objectives, command and control, installation, delivery, exploitation

  • MITRE ATT&CK added: T1005, T1071

  • Previously existing MITRE ATT&CK: T1071, T1005, T1041, T1567, T1095, T1105, T1486, T1587, T1496

  • Methods added: 14

 

XWorm (RAT)

Cyble research labs found a malware developer advertising a powerful Windows RAT on the dark web during a threat-hunting exercise.

  • Added kill chain phase(s): command and control

  • Previously supported kill chain phase(s): command and control, delivery

  • MITRE ATT&CK added: T1573

  • Previously existing MITRE ATT&CK: T1071, T1573

  • Methods added: 8

 

Other Threat Detection Update(s)

The following threat detection(s) were improved this past week with new or updated threat methods.

 

Name of threat New coverage Total coverage Last updated
  New Detection methods Kill chain phases Protocols involved Detection methods Kill chain phases Protocols involved  
Command and Control 6 command and control, actions on objectives tcp-pkt 650 actions on objectives, command and control, delivery, installation dns, http, icmp, tcp, tcp-pkt, tls 2026-04-19
DonutLoader 1 delivery http 1 delivery http 2026-04-19
Fake Browser 21 exploitation dns, tls, http 2005 command and control, delivery, exploitation dns, http, tls 2026-04-17
LandUpdate808 37 command and control, exploitation, actions on objectives dns, tls, http 926 actions on objectives, command and control, delivery, exploitation dns, http, tls 2026-04-19
LucidRook 2 actions on objectives, delivery ftp 2 actions on objectives, delivery ftp 2026-04-15
Lumma 45 command and control, actions on objectives dns, tls, http 7930 actions on objectives, command and control, delivery, installation dns, http, tls 2026-04-18
NetSupport RAT 3 command and control http 216 actions on objectives, command and control, exploitation, installation dns, http, tls 2026-04-18
ShadowLink 5 command and control, installation http 5 command and control, installation http 2026-04-15
SocGholish 15 command and control dns, tls, http 2204 actions on objectives, command and control, delivery, exploitation, reconnaissance dns, http, tcp, tcp-pkt, tls 2026-04-18
Stealer and Exfiltration 14 actions on objectives, command and control http, dns, tls 531 actions on objectives, command and control, delivery, exploitation, installation dns, ftp, http, smtp, tcp, tcp-pkt, tls 2026-04-19
TA2725 1 command and control http 1 command and control http 2026-04-19
VENOM PhaaS 33 delivery dns, tls, http 33 delivery dns, tls, http 2026-04-19
XWorm 8 command and control tcp-pkt 5043 command and control, delivery dns, http, tcp, tcp-pkt, tls 2026-04-18
XorBee 13 command and control dns, tcp-pkt, http, tls 13 command and control dns, tcp-pkt, http, tls 2026-04-15

 

Additional Resources

Technical support
Join the conversation on Discord
Follow us Twitter
Follow us on LinkedIn
Subscribe to our YouTube channel
Stamus Networks website

Schedule a Demo of Clear NDR

Request a Demo