The Containment Era is here. →Explore

Executive Summary

In October 2025, cybersecurity researchers uncovered significant new capabilities in the Rhadamanthys Stealer malware, including advanced device fingerprinting and the use of PNG steganography to distribute malicious payloads. Initially spread via cybercrime forums, the malware author has expanded its ecosystem with additional tools like Elysium Proxy Bot and Crypt Service, targeting organizations worldwide. Threat actors leveraged these upgrades to collect detailed browser and system data while evading detection, resulting in an uptick of credential, financial, and sensitive data thefts across enterprise environments.

The evolution of Rhadamanthys Stealer highlights a broader trend of information stealer malware using novel evasion tactics and multi-tool ecosystems. Its modularity and innovative payload delivery have driven increased attention from security teams and regulators, as businesses seek to defend against ever-more-sophisticated data exfiltration methods.

Why This Matters Now

Rhadamanthys Stealer's new features—device fingerprinting and PNG steganography—demonstrate a rapid escalation in stealth and data gathering by cybercriminals. With attackers continuously adopting inventive approaches for exfiltration and lateral movement, organizations face more complex detection and compliance challenges, making timely defenses and visibility urgent.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

The incident underscored challenges in east-west traffic visibility, egress control, and anomaly detection, highlighting gaps in organizations' Zero Trust and data security controls.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Comprehensive Zero Trust controls including segmentation, egress policy enforcement, encrypted east-west traffic inspection, and real-time threat detection could have disrupted Rhadamanthys Stealer at multiple stages by reducing lateral movement, blocking C2 and exfiltration, and enhancing visibility across cloud workloads. CNSF capabilities would limit blast radius and ensure suspicious outbound activity—including steganographic data leaks—are promptly flagged or blocked.

Initial Compromise

Control: Threat Detection & Anomaly Response

Mitigation: Anomalous user or endpoint behavior detected at initial execution.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: Identity-based least privilege restricts access even if credentials are abused.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Suspicious internal traffic is segmented and inspected, limiting spread.

Command & Control

Control: Cloud Firewall (ACF)

Mitigation: Outbound C2 traffic is blocked or flagged by egress URL/IP filtering and inline IPS.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: Stealthy exfiltration attempts are prevented with fine-grained egress control.

Impact (Mitigations)

Rapid incident response and blast radius analysis prevent further damage.

Impact at a Glance

Affected Business Functions

  • Data Management
  • Financial Transactions
  • Customer Relationship Management
Operational Disruption

Estimated downtime: 5 days

Financial Impact

Estimated loss: $500,000

Data Exposure

Potential exposure of sensitive customer data, including financial information and personal identifiers, leading to regulatory penalties and reputational damage.

Recommended Actions

  • Deploy Zero Trust Segmentation to strictly limit access between workloads and enforce least privilege across all users and endpoints.
  • Implement East-West Traffic Security to monitor and control internal cloud communications, reducing the effectiveness of lateral movement techniques.
  • Enforce Egress Policy with real-time inspection to detect and block abnormal outbound traffic patterns, including those using steganography for data exfiltration.
  • Enable Threat Detection & Anomaly Response to continuously baseline user and service behavior and quickly flag new suspicious patterns.
  • Centralize Multicloud Visibility & Control for rapid incident response, unified policy enforcement, and comprehensive cloud traffic governance.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image