CrystalX RAT: new MaaS malware combines spyware, stealer, and remote access
嗯,用户让我用中文总结一下这篇文章,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。首先,我需要通读全文,抓住主要信息。 文章讲的是CrystalX RAT这个新的MaaS恶意软件,结合了间谍软件、数据窃取和远程访问功能。Kaspersky的研究人员在2026年3月发现了它,通过Telegram推广,有三个订阅层级。它的功能包括远程控制、键盘记录、剪贴板劫持,甚至还有恶作剧功能。传播方式尚不明确,但受害者主要在俄罗斯,未来可能全球扩散。 接下来,我需要把这些要点浓缩到100字以内。重点包括:CrystalX RAT的功能、发现时间、推广平台、订阅层级、具体功能以及影响范围。 可能的结构是:先介绍恶意软件及其功能,然后提到研究人员的发现和推广情况,最后说明影响范围和潜在威胁。 现在试着组织语言:“CrystalX RAT是一种结合间谍软件、数据窃取和远程访问的新MaaS恶意软件。研究人员于2026年3月发现其通过Telegram推广,并提供三个订阅层级。该恶意软件具备远程控制、键盘记录和剪贴板劫持等功能,并包含恶作剧模块以骚扰用户。目前受害者主要集中在俄罗斯,未来可能全球扩散。” 这样大概控制在100字左右,并且直接描述了文章内容。 </think> CrystalX RAT是一种结合间谍软件、数据窃取和远程访问的新MaaS恶意软件。研究人员于2026年3月发现其通过Telegram推广,并提供三个订阅层级。该恶意软件具备远程控制、键盘记录和剪贴板劫持等功能,并包含恶作剧模块以骚扰用户。目前受害者主要集中在俄罗斯,未来可能全球扩散。 2026-4-3 13:23:57 Author: securityaffairs.com(查看原文) 阅读量:6 收藏

CrystalX RAT: new MaaS malware combines spyware, stealer, and remote access

CrystalX RAT, a new sophisticated MaaS malware, combines spyware, data theft, and remote access, allowing attackers to monitor victims.

In March 2026, Kaspersky researchers uncovered a Telegram-based campaign promoting a previously unknown malware sold as a MaaS with three subscription tiers. The Trojan offers a wide range of features, including RAT capabilities, data theft, keylogging, clipping, spyware, and even prank functions to annoy users. This unusual mix makes it stand out, and Kaspersky detects it as CrystalX and related malware variants.

First seen in January 2026 as Webcrystal RAT, this malware was promoted in private Telegram groups and later rebranded as CrystalX RAT, expanding to YouTube marketing. The malware includes a control panel with an auto-builder that lets attackers customize features like geoblocking, anti-analysis tools, and file appearance. Payloads are compressed with zlib and encrypted using ChaCha20. It uses anti-debugging techniques such as proxy and MITM checks, VM detection, anti-attach loops, and stealth patches that bypass security functions, making analysis and detection more difficult.

Once executed, it connects to a command-and-control server, gathers system data, and can steal credentials from apps and browsers, though this feature is currently being updated. It also includes keylogging and clipboard hijacking, even injecting malicious browser extensions to swap crypto wallet addresses.

“When launched, the malware establishes a connection to its C2 using a hard‑coded URL over the WebSocket protocol. It performs an initial collection of system information, after which all data is sent in JSON format as plain text. Then the malware executes the stealer function, doing so either once or at predefined intervals depending on the build options.” reads the report published by Kaspersky. “The stealer extracts the victim’s credentials for Steam, Discord, and Telegram from the system. It also gathers data from Chromium‑based browsers using the popular ChromeElevator utility.”

Stolen data is sent to the C2, with dedicated routines for Yandex and Opera. The stealer feature is currently disabled, likely for updates. The RAT includes a keylogger that streams keystrokes in real time and a clipper that can alter clipboard data or inject malicious browser extensions to replace crypto wallet addresses. It also enables full remote access, allowing attackers to run commands, manage files, control the screen via VNC, and capture audio and video.

The malware includes a “Rofl” section with prank features to annoy victims. Attackers can change wallpapers, rotate the screen, swap mouse buttons, disable peripherals, or trigger shutdowns. Other options include hiding icons, disabling system tools, showing fake notifications, and making the cursor move randomly. It also allows sending messages and opening a chat window for direct interaction with the victim.

The researchers pointed out that the initial infection vector remains unclear, but dozens of victims have been affected, mainly in Russia so far. The MaaS has no geographic limits, meaning it could spread globally. Ongoing development and new versions, along with active promotion, suggest CrystalX RAT infections are likely to rise significantly in the near future.

“The sheer variety of available RATs has perpetuated demand, as actors prioritize flexibility of existing malware and its infrastructure.” concludes the report. “Thus, CrystalX RAT represents a highly functional MaaS platform that is not limited to espionage capabilities – spyware, keylogging and remote control – but includes unique stealer and prankware features.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, CrystalX RAT)




文章来源: https://securityaffairs.com/190310/cyber-crime/crystalx-rat-new-maas-malware-combines-spyware-stealer-and-remote-access.html
如有侵权请联系:admin#unsafe.sh