TechBriefly
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska
No Result
View All Result
TechBriefly
Home Tech Security
Fortinet warns of UpCrypter malware phishing campaign

Fortinet warns of UpCrypter malware phishing campaign

Kerem GülenbyKerem Gülen
27 August 2025
in Security, Tech
Reading Time: 2 mins read
Share on FacebookShare on Twitter

A widespread phishing campaign leveraging the UpCrypter malware is targeting Windows users globally, with the goal of establishing long-term remote access to compromised systems. Cybersecurity researchers at Fortinet’s FortiGuard Labs have been tracking the surge in these attacks since early August 2025.

The attack vector involves phishing emails disguised as missed voicemails or purchase orders. These emails redirect victims to convincing fake websites that prompt them to download a ZIP file. This ZIP archive contains a heavily obfuscated JavaScript dropper.

According to Cara Lin, a Fortinet FortiGuard Labs researcher, these malicious pages are designed to lure recipients into downloading seemingly harmless JavaScript files. Once executed, the JavaScript triggers PowerShell commands in the background, establishing a connection with attacker-controlled servers to download the next stage of the malware.

The UpCrypter loader then scans the compromised system for sandbox environments or forensic tools. If detected, UpCrypter will force a reboot to disrupt analysis. If no such obstacles are present, UpCrypter downloads and executes further payloads, sometimes concealing these files within images using steganography to evade antivirus detection.

The final stage of the attack involves deploying remote access tools (RATs), including PureHVNC, DCRat (DarkCrystal RAT), and Babylon RAT. PureHVNC allows for hidden remote desktop access, while DCRat provides a multifunction tool for spying and data theft. Babylon RAT enables attackers to gain complete control over the infected device.

Fortinet researchers have observed that the attackers employ various techniques to conceal their malicious code. These include string obfuscation, modification of registry settings for persistence, and in-memory code execution to minimize traces on the disk.

The phishing campaign has demonstrated international reach, with significant activity detected in Austria, Belarus, Canada, Egypt, India, and Pakistan. The sectors most heavily targeted include manufacturing, technology, healthcare, construction, and retail/hospitality. Detections of the UpCrypter malware have doubled in a mere two weeks, highlighting the rapid expansion of this campaign.

This attack is not simply about stealing credentials; it aims to deploy a chain of malware designed to remain hidden within corporate systems for an extended period, granting attackers persistent access. Fortinet advises users and organizations to take this threat seriously by implementing strong email filters and providing staff training to recognize and avoid these types of phishing attacks.

Tags: fortinetphishingupcrypter
ShareTweet
Kerem Gülen

Kerem Gülen

Kerem from Turkey has an insatiable curiosity for the latest advancements in tech gadgets and a knack for innovative thinking.With 3 years of experience in editorship and a childhood dream of becoming a journalist, Kerem has always been curious about the latest tech gadgets and is constantly seeking new ways to create.As a Master's student in Strategic Communications, Kerem is eager to learn more about the ever-evolving world of technology. His primary focuses are artificial intelligence and digital inclusion, and he delves into the most current and accurate information on these topics.

Related Posts

Bluesky opens “Live Now” badges to all users to lure Twitch creators

Bluesky opens “Live Now” badges to all users to lure Twitch creators

16 January 2026
Paramount+ slams subscribers with first price hike since 2024

Paramount+ slams subscribers with first price hike since 2024

16 January 2026
Ashley St. Clair sues xAI over Grok deepfakes

Ashley St. Clair sues xAI over Grok deepfakes

16 January 2026
Samsung launches instant-play cloud streaming in Mobile Gaming Hub update

Samsung launches instant-play cloud streaming in Mobile Gaming Hub update

16 January 2026

LATEST

OpenAI rockets $250 million into Altman’s Merge Labs brain-AI bridge

Bluesky opens “Live Now” badges to all users to lure Twitch creators

Capcom reveals Resident Evil: Requiem classic mode and ink ribbons

How to tell if your iPhone or Android phone is carrier unlocked

Paramount+ slams subscribers with first price hike since 2024

Ashley St. Clair sues xAI over Grok deepfakes

Samsung launches instant-play cloud streaming in Mobile Gaming Hub update

Netflix secures Sony Pictures first-to-stream rights

How to apply screen protectors without air bubbles

How to check if someone read your message on iPhone or iPad

TechBriefly

© 2021 TechBriefly is a Linkmedya brand.

  • Tech
  • Business
  • Science
  • Geek
  • How to
  • About
  • Privacy
  • Terms
  • Contact
  • | Network Sites |
  • Digital Report
  • LeaderGamer

Follow Us

No Result
View All Result
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska