RDStealer: The Custom Malware Behind a Highly-Targeted Cyber Attack

Every day, the digital world faces new cybersecurity threats and attacks. One of these threats that has recently emerged is the RDStealer, a custom malware that was used in a highly targeted cyber attack against an East Asian IT company. This attack highlights the growing sophistication of modern cyber attacks and the increasing importance of credentials and saved connections.

Overview of the Targeted Cyber Attack against an East Asian IT Company

The targeted cyber-attack was launched against an East Asian IT company with the aim of compromising its credentials and exfiltrating data. The attack had been in operation for over a year, with the attackers focusing on stealing sensitive data from the IT company’s network.

Duration and goal of the operation

The RDStealer malware was used in the cyber attack and was designed with the goal of continuously gathering clipboard content and keystroke data from infected hosts. The attackers were able to remain undetected for over a year as a result of this technique.

Machines infected during the incident

According to the security firm Bitdefender, all the machines that were infected during the incident were manufactured by Dell. The attackers may have chosen this approach to camouflage their malicious activity, making it more difficult to detect by IT staff.

The attack was characterized by the use of a server-side backdoor called RDStealer. This backdoor malware is written in Golang and is specifically designed to steal sensitive data. It monitors clipboard activity and keystrokes, and it also has the capability to monitor incoming Remote Desktop Protocol (RDP) connections.

The RDStealer malware is particularly formidable due to its capability to monitor incoming RDP connections and compromise a remote machine if client drive mapping is enabled. When a new RDP client connection is detected, the malware issues commands to exfiltrate sensitive data, such as browsing history, credentials, and private keys from apps like mRemoteNG, KeePass, and Google Chrome.

Exfiltration of sensitive data by RDStealer

The sensitive data that RDStealer can steal from infected machines is significant. The malware can steal everything from browser history to saved credentials, and even private keys from various apps. This can include data from apps such as KeePass, Google Chrome, and other password management tools.

The RDP clients that are connected are infected with another Golang-based custom malware, called Logutil. This malware is used to maintain a persistent foothold on the victim network using DLL side-loading techniques and to facilitate command execution. The use of two different custom malware pieces indicates that the attackers were well-prepared and sophisticated.

Limited information is available about the threat actor. Not much is known about the individual or group responsible for this targeted cyber attack, except that it has been active since at least 2020. The attackers have chosen to remain anonymous and they have not yet been identified.

The increasing sophistication of modern cyber attacks and the importance of credentials and saved connections are highlighted by the use of custom malware such as RDStealer. Attackers are continuously devising new techniques to infiltrate their target’s networks and steal confidential data. This attack emphasizes the significance of securing credentials and saved connections as they can be compromised and utilized to extract sensitive information.

Custom malware such as RDStealer poses a clear and present danger that IT managers and cybersecurity professionals must be aware of. Keeping up-to-date with the latest techniques and methods used by attackers can help organizations prepare and defend against them. As cyber attacks become more sophisticated, it is critical for organizations to remain vigilant and take proactive measures to protect their networks and data.

Explore more

Harness and AWS Integrate AI to Unify Software Delivery

Harness and Amazon Web Services are expanding their strategic partnership by integrating their respective artificial intelligence agents to forge a unified and highly automated software engineering workflow. Announced at the AWS re:Invent 2025 conference, this initiative centers on connecting the Model Context Protocol server from Harness’s CI/CD platform with Kiro, AWS’s proprietary AI coding tool, signaling a major shift toward

The Rise of Women Billionaires Reshapes Global Wealth

A seismic shift is quietly reconfiguring the highest echelons of global finance, as new data reveals women are not only joining the billionaire class in growing numbers but are also accumulating wealth at a pace that significantly outstrips their male counterparts. This burgeoning financial power, driven by a confluence of massive inheritance transfers and a new wave of female entrepreneurship,

Trend Analysis: Enterprise SEO Services

In a digital landscape where AI is rewriting the rules of search, traditional SEO tactics are no longer sufficient for large-scale organizations. For enterprises managing vast and complex digital footprints, a more sophisticated, scalable, and integrated approach is not just an advantage—it has become a critical business imperative for survival and growth. This analysis will deconstruct the rise of Enterprise

Strategic Syndication Redefines B2B Demand Generation

In the face of escalating B2B marketing costs and the diminishing returns from traditional lead generation tactics, a profound transformation is reshaping the demand generation landscape. As the B2B buyer’s journey has grown more complex and self-directed, the once-reliable strategy of mass content distribution has become a liability, yielding low-quality leads and unpredictable returns. Consequently, a necessary evolution is underway,

Lenovo LOQ 15 Gaming Laptop – Review

Imagine snagging a capable gaming laptop for under $700 during the frenzied Cyber Monday sales, a price point that seems almost too good to be true in a market where component costs keep climbing. This scenario is a reality with the Lenovo LOQ 15, currently available at Best Buy for a staggering $649.99, slashed from its original $1,099.99. This deal,