A brand new wave of cyber threats has emerged with the invention of up to date variants of Chaos RAT, a infamous open-source distant administration device (RAT) first recognized in 2022.
As reported by Acronis TRU researchers of their current 2025 evaluation, this malware continues to evolve, concentrating on each Linux and Home windows environments with refined capabilities for espionage and information exfiltration.
Cross-Platform Malware on the Rise
Written in Golang, Chaos RAT leverages cross-platform compatibility, enabling attackers to deploy payloads throughout numerous programs with relative ease.

Its newest iterations, noticed in real-world assaults, disguise themselves as reputable community troubleshooting utilities, significantly for Linux customers, luring unsuspecting victims into downloading malicious payloads such because the not too long ago analyzed “NetworkAnalyzer.tar.gz” file submitted from India on VirusTotal.
Chaos RAT’s structure reveals a extremely versatile and harmful toolset. Its administrative panel, accessible through a browser at http://localhost:8080 with default credentials (admin:admin), offers attackers with a dashboard to construct 64-bit payloads, handle compromised shoppers, and execute instructions.

The RAT helps a wide selection of capabilities, together with system info gathering (through the “getos” command), screenshot seize utilizing the kbinani/screenshot library, and file manipulation by way of add, obtain, and delete operations.
Communication with its command-and-control (C2) server is secured with Base64-encoded configurations and JSON Internet Tokens (JWTs) for authentication, as seen in current samples with embedded IP addresses like 176.65.141.63 and ports similar to 5223.
Exploiting Vulnerabilities
Furthermore, a important vulnerability (CVE-2024-30850) in its net panel permits distant code execution on the server itself, a flaw exploited to humorous impact by safety researcher Chebuya, who tricked the panel into enjoying Rick Astley’s “By no means Gonna Give You Up.”
This vulnerability, compounded by an XSS concern (CVE-2024-31839), underscores the dual-edged nature of Chaos RAT as each a device for attackers and a possible goal for counter-exploitation.
Its open-source availability on GitHub, final up to date in October 2024, additional amplifies the chance, as menace actors can customise it to evade detection, mixing into cybercrime noise and complicating attribution ways usually seen with APT teams like APT41 and APT10 utilizing comparable RATs.
The malware’s persistence mechanisms, similar to modifying /and many others/crontab in Linux for scheduled payload updates, and its means to function stealthily on Home windows with hidden execution choices, make it a potent menace for establishing footholds in ransomware campaigns.
Acronis Cyber Defend Cloud detects these variants as “Trojan.Linux.ChaosRAT.A,” and their EDR resolution now helps Linux environments like Ubuntu 22.04, mapping threats to the MITRE ATT&CK framework for actionable remediation.
As Chaos RAT continues to focus on delicate information throughout platforms, defenders should stay vigilant, leveraging indicators of compromise (IOCs) and YARA guidelines offered by Acronis to bolster detection and mitigation efforts.
Indicators of Compromise (IOCs)
Sort | Worth |
---|---|
SHA256 | 1e074d9dca6ef0edd24afb2d13ca4429def5fc5486cd4170c989ef60efd0bbb0 |
SHA256 | a51416ea472658b5530a92163e64cfa51f983dfabe3da38e0646e92fb14de191 |
YARA Rule | ELF_Chaos_RAT (Detects Linux ELF binaries <10MB with CHAOS-RAT indicators) |
To Improve Your Cybersecurity Abilities, Take Diamond Membership With 150+ Sensible Cybersecurity Programs On-line – Enroll Right here