Phishing Scheme Exploits UpCrypter in Fake Voicemail Emails to Deploy RAT Payloads

Aug 25, 2025
Malware / Cloud Security

Cybersecurity experts have identified a new phishing scheme utilizing deceptive voicemail and purchase order emails to distribute a malware loader named UpCrypter. According to Fortinet FortiGuard Labs researcher Cara Lin, the campaign employs “carefully crafted emails to deliver malicious URLs linked to convincing phishing pages.” These pages are designed to lure recipients into downloading JavaScript files that serve as droppers for UpCrypter. Since early August 2025, the attacks have predominantly targeted sectors such as manufacturing, technology, healthcare, construction, and retail/hospitality worldwide. Significant infections have been recorded in countries including Austria, Belarus, Canada, Egypt, India, and Pakistan. UpCrypter acts as a conduit for various remote access tools (RATs), including PureHVNC RAT, DCRat (also known as DarkCrystal RAT), and Babylon RAT, allowing attackers to gain complete control over compromised systems.

Phishing Campaign Exploits UpCrypter to Distribute RAT Malware via Fake Voicemail Emails

On August 25, 2025, cybersecurity researchers identified a sophisticated phishing campaign utilizing counterfeit voicemail notifications and purchase orders to disseminate a malware loader known as UpCrypter. According to Cara Lin, a researcher at Fortinet’s FortiGuard Labs, the attackers have meticulously crafted emails that lead recipients to deceptive URLs associated with credible phishing sites. These pages are designed to lure users into downloading JavaScript files, which serve as droppers for the UpCrypter malware.

These malicious campaigns have predominantly targeted sectors such as manufacturing, technology, healthcare, construction, and hospitality worldwide since early August 2025. The most significant number of infections has been reported in several countries, including Austria, Belarus, Canada, Egypt, India, and Pakistan, raising concerns regarding the widespread impact of this initiative.

UpCrypter is particularly concerning as it functions as a carrier for various remote access tools (RATs), including PureHVNC RAT, DCRat (commonly referred to as DarkCrystal RAT), and Babylon RAT. Each of these tools equips attackers with the capability to gain comprehensive control over compromised systems.

The modus operandi employed in this campaign aligns with several tactics outlined in the MITRE ATT&CK framework. The attackers likely relied on initial access techniques, exploiting social engineering to trick recipients into executing the payload. Furthermore, persistence mechanisms could have been employed to maintain access to infected machines, while privilege escalation tactics may also have been a significant aspect of the malware’s functionality, allowing adversaries to elevate their control once inside a system.

Given the sophistication and calculated nature of this phishing attack, business owners should remain vigilant. It is crucial to educate employees about the risks associated with unsolicited emails, particularly those that present plausible yet fraudulent notifications. Regular training programs may play a vital role in mitigating the risks of falling victim to such schemes.

As the threat landscape continues to evolve, organizations must prioritize robust cybersecurity measures and keep abreast of emerging threats. Proactive monitoring and incident response strategies are essential to safeguard against the infiltration of malware like UpCrypter, which can have devastating effects on business operations. The ongoing vigilance against phishing attacks and the cultivation of a security-conscious culture within the workforce can significantly reduce vulnerability to such sophisticated cyber threats.

Source link