TechBriefly
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska
No Result
View All Result
TechBriefly
Home Tech Security
Fortinet warns of UpCrypter malware phishing campaign

Fortinet warns of UpCrypter malware phishing campaign

Kerem GülenbyKerem Gülen
27 August 2025
in Security, Tech
Reading Time: 2 mins read
Share on FacebookShare on Twitter

A widespread phishing campaign leveraging the UpCrypter malware is targeting Windows users globally, with the goal of establishing long-term remote access to compromised systems. Cybersecurity researchers at Fortinet’s FortiGuard Labs have been tracking the surge in these attacks since early August 2025.

The attack vector involves phishing emails disguised as missed voicemails or purchase orders. These emails redirect victims to convincing fake websites that prompt them to download a ZIP file. This ZIP archive contains a heavily obfuscated JavaScript dropper.

According to Cara Lin, a Fortinet FortiGuard Labs researcher, these malicious pages are designed to lure recipients into downloading seemingly harmless JavaScript files. Once executed, the JavaScript triggers PowerShell commands in the background, establishing a connection with attacker-controlled servers to download the next stage of the malware.

The UpCrypter loader then scans the compromised system for sandbox environments or forensic tools. If detected, UpCrypter will force a reboot to disrupt analysis. If no such obstacles are present, UpCrypter downloads and executes further payloads, sometimes concealing these files within images using steganography to evade antivirus detection.

The final stage of the attack involves deploying remote access tools (RATs), including PureHVNC, DCRat (DarkCrystal RAT), and Babylon RAT. PureHVNC allows for hidden remote desktop access, while DCRat provides a multifunction tool for spying and data theft. Babylon RAT enables attackers to gain complete control over the infected device.

Fortinet researchers have observed that the attackers employ various techniques to conceal their malicious code. These include string obfuscation, modification of registry settings for persistence, and in-memory code execution to minimize traces on the disk.

The phishing campaign has demonstrated international reach, with significant activity detected in Austria, Belarus, Canada, Egypt, India, and Pakistan. The sectors most heavily targeted include manufacturing, technology, healthcare, construction, and retail/hospitality. Detections of the UpCrypter malware have doubled in a mere two weeks, highlighting the rapid expansion of this campaign.

This attack is not simply about stealing credentials; it aims to deploy a chain of malware designed to remain hidden within corporate systems for an extended period, granting attackers persistent access. Fortinet advises users and organizations to take this threat seriously by implementing strong email filters and providing staff training to recognize and avoid these types of phishing attacks.

Tags: fortinetphishingupcrypter
ShareTweet
Kerem Gülen

Kerem Gülen

Kerem from Turkey has an insatiable curiosity for the latest advancements in tech gadgets and a knack for innovative thinking.With 3 years of experience in editorship and a childhood dream of becoming a journalist, Kerem has always been curious about the latest tech gadgets and is constantly seeking new ways to create.As a Master's student in Strategic Communications, Kerem is eager to learn more about the ever-evolving world of technology. His primary focuses are artificial intelligence and digital inclusion, and he delves into the most current and accurate information on these topics.

Related Posts

Nvidia Rubin GPUs: 200 teraFLOPS FP64 from software emulation

Nvidia Rubin GPUs: 200 teraFLOPS FP64 from software emulation

19 January 2026
Walmart maintains Apple Pay blockade across US stores for 2026

Walmart maintains Apple Pay blockade across US stores for 2026

19 January 2026
Apple shifts iOS 27 focus to quality and underlying performance

Apple shifts iOS 27 focus to quality and underlying performance

19 January 2026
Google integrates Wallet and Tasks into Pixel 10 Magic Cue

Google integrates Wallet and Tasks into Pixel 10 Magic Cue

19 January 2026

LATEST

Nvidia Rubin GPUs: 200 teraFLOPS FP64 from software emulation

Walmart maintains Apple Pay blockade across US stores for 2026

Musk demands $134 billion from OpenAI and Microsoft for wrongful gains

Apple shifts iOS 27 focus to quality and underlying performance

Google integrates Wallet and Tasks into Pixel 10 Magic Cue

Threads overtakes X with 141.5M mobile users

Microsoft issues emergency fix for Windows 11 shutdown bugs

How to gain full control by jailbreaking iPhone and rooting Android

How to create folders and add widgets on Android

OpenAI rockets $250 million into Altman’s Merge Labs brain-AI bridge

TechBriefly

© 2021 TechBriefly is a Linkmedya brand.

  • Tech
  • Business
  • Science
  • Geek
  • How to
  • About
  • Privacy
  • Terms
  • Contact
  • | Network Sites |
  • Digital Report
  • LeaderGamer

Follow Us

No Result
View All Result
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska