RevengeHotels Uses AI-Generated Scripts to Deploy VenomRAT Malware on Windows

RevengeHotels (TA558), active since 2015, has upgraded its attacks by using AI-generated loader scripts to deliver VenomRAT malware targeting Windows users. The campaign starts with phishing emails to hotel staff, leading victims to fake document portals that download malicious scripts.


These AI-crafted loaders execute PowerShell files in memory, avoiding detection. VenomRAT, an advanced QuasarRAT variant, offers hidden VNC, file theft, privilege escalation, and strong encryption. It resists termination, kills security tools, and maintains persistence via registry scripts.


VenomRAT communicates with command servers through encrypted channels and uses ngrok tunnels to bypass firewalls. It spreads via USB drives and erases logs to hide its presence, giving attackers stealthy, persistent control over infected systems.
NPAV offers a robust solution to combat cyber fraud. Protect yourself with our top-tier security product, Z Plus Security
- Other (43)
- Ransomware (167)
- Events and News (27)
- Features (45)
- Security (494)
- Tips (79)
- Google (37)
- Achievements (12)
- Products (37)
- Activation (7)
- Dealers (1)
- Bank Phishing (56)
- Malware Alerts (259)
- Cyber Attack (342)
- Data Backup (15)
- Data Breach (167)
- Phishing (177)
- Securty Tips (3)
- Browser Hijack (22)
- Adware (15)
- Email And Password (76)
- Android Security (88)
- Knoweldgebase (38)
- Botnet (19)
- Updates (6)
- Alert (71)
- Hacking (78)
- Social Media (10)
- vulnerability (114)
- Hacker (54)
- Spyware (14)
- Windows (13)
- Microsoft (36)
- Uber (1)
- YouTube (2)
- Trojan (7)
- Website hacks (10)
- Paytm (1)
- Credit card scam (4)
- Telegram (5)
- RAT (9)
- Bug (3)
- Twitter (3)
- Facebook (11)
- Banking Trojan (13)
- Mozilla (2)
- COVID-19 (5)
- Instagram (4)
- NPAV Announcement (14)
- IoT Security (3)
- Deals and Offers (2)
- Cloud Security (12)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (3)
- Amazon (4)
- DMart (1)
- Payment Risk (5)
- Occasion (3)
- firewall (4)
- Cloud malware (3)
- Cloud storage (2)
- Financial fraud (86)
- Impersonation phishing (1)
- DDoS (10)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (3)
- ZIP (2)
- Fraud Protector (74)
-
Mobile Frauds
(36)
- WhatsApp (10)
- AI (12)