Operation Endgame Quakes Rhadamanthys 

SecurityVendor

Key takeaways 

Rhadamanthys is a prominent malware observed since 2022, used by multiple cybercriminal threat actors. 
The malware has been observed delivered via email, web injects, and malvertising campaigns.  
It is a modular information stealer with multiple pricing plans, and the creators sell it alongside Elysium Proxy Bot and a Crypt Service.  
International law enforcement disrupted Rhadamanthys and affiliates’ infrastructure as part of ongoing Operation Endgame efforts. 

Overview 

Rhadamanthys malware has evolved significantly over time, reflecting ongoing advancements in cybercriminal techniques. First observed in 2022, Rhadamanthys emerged as a sophisticated information stealer, primarily targeting sensitive user data such as login credentials, financial information, and system details. It quickly gained popularity on underground forums, where its capabilities and ease of customization attracted various cybercriminals. 

Throughout its development, Rhadamanthys updates include new features, improving its evasion tactics and adaptability. Updates often allow it to avoid detection by security and detection controls more effectively, often through techniques involving obfuscation and anti-analysis. The malware authors introduced multi-stage payloads, which enabled the malware to bypass security layers by spreading across stages in discrete steps. Additionally, it became more modular, allowing threat actors to tailor capabilities to specific attacks or targets. 

The operators sell access to Rhadamanthys for between $300 to $500 a month, with options for a higher price point for customized uses. Notably, some cybercriminal forums banned the sale of Rhadamanthys because it allowed the targeting of Russian and Commonwealth of Independent States countries.  

Proofpoint observes Rhadamanthys delivered via email campaigns conducted by multiple threat actors. Techniques for payload delivery include leveraging the ClickFix social engineering technique, pairing URLs and aggressive filtering with instructions that advise people to copy, paste, and run PowerShell scripts to infect themselves with malware. Threat actors including TA585, TA2541, TA547, TA571, TA866, and numerous unattributed threat clusters have used Rhadamanthys in campaigns.  

Proofpoint observed more Rhadamanthys campaigns so far in 2025 than previous years, in part due to more threat actors leveraging compromised websites to deliver malware, including Rhadamanthys. (Analyst note: it is possible there was additional low-volume activity observed in email threat data that was not campaigned by threat researchers.) 

Figure 1. Timeline of Rhadamanthys campaigns. 

Operation Endgame 

On 13 November 2025, law enforcement disrupted Rhadamanthys’s infrastructure – specifically taking down multiple servers associated with the management and operation of the malware – as well as infrastructure associated with affiliates using the malware. This disruption was part of Operation Endgame, a collaboration between global law enforcement and private sector partners. Additional services like Elysium Proxy Bot were also affected. Notably, law enforcement also posted a video on the operation’s main website that suggested that the threat actor behind Rhadamanthys was not only facilitating information stealer operations but also stealing sensitive data from Rhadamanthys affiliates. In addition to the infrastructure disruption, it’s likely that this operation will also negatively affect the criminals’ reputation, leading affiliates to mistrust them. 

Operation Endgame is a widespread effort conducted by global law enforcement and private sector partners, including Proofpoint, to disrupt malware and botnet infrastructure and identify the alleged individuals associated with the activity. In May 2024, the first Operation Endgame disruption effort targeted multiple malware families including IcedID, Bumblebee, SystemBC, Pikabot, SmokeLoader, and more, and Europol called it the “largest ever operation against botnets, which play a major role in the deployment of ransomware.” The second major Operation Endgame action occurred in May 2025 and targeted additional malware families and their creators, including DanaBot, WarmCookie, Trickbot, and Hijack Loader. The major malware-as-a-service Lumma Stealer has also been targeted by law enforcement.  

Operation Endgame disruptions have significantly affected the overall email threat landscape, specifically disrupting activity attributed to known initial access broker (IAB) payloads and supporting malware families delivered via email-based campaigns. For example, in March 2023, 17% of email-based malware campaigns in Proofpoint data were associated with malware targeted by Operation Endgame, while that number had dropped to 1% by September 2025. 

History 

When Rhadamanthys first emerged in 2022, it was a commercially marketed information-stealer sold via underground forums by the alias “kingcrete2022”. It swiftly evolved from a simple malware to a modular Malware-as-a-Service (MaaS) offering as developers added plugins and staged loader architecture to make analysis and detection harder. Early development ascended into a cadence of rapid releases.  

By 2024, the malware was shipped with a notable update that added AI-driven OCR capabilities to automatically identify and extract cryptocurrency seed phrases from images. This version included new evasion and encryption upgrades. The operator also offered new conveniences for customers that reflected popular trends in the threat landscape, one of which was MSI installer execution to assist in bypassing security detections. 

In late 2024 through 2025, researchers noted an increase in Rhadamanthys campaigns which leveraged the malware’s modularity to tailor to threat actors with different objectives and levels of sophistication. In 2025, the developers pushed a new 0.9.X series that hardened network and packing obfuscation, expanded device and browser fingerprinting, reintroduced PNG steganography for hiding payloads, and adopted marketing changes. These changes included tiered pricing updates, enhanced features, and rebranding. The rebranding was reflected in a modernized site emphasizing a more professional MaaS business model, rapid feature growth, more useful distribution and monetization techniques, and an ecosystem that makes Rhadamanthys a favored malware of choice. 

The takedown and disruption of many prominent loaders and top tier malware by Operation Endgame primed the market for Rhadamanthys to rise. Evidence suggests the malware is maintained and improved by capable developers. New releases have correlated to current and coveted resources and landscape trends, delivered in a way that makes it easy to utilize for customers.  

Figure 2. Priority malware in campaign data and the impact of Operation Endgame. 

Affiliations 

As a MaaS, different affiliates may license the malware, attach custom plugins, and run campaigns independently. It is advertised on multiple forums, meaning it is not exclusive to a group of trusted affiliates but is instead available to a larger market. It is notable the creators developed the malware to be used by threat actors with varying expertise. As a result, Rhadamanthys has been observed in campaigns as simple as compressed executables attached to emails, and more sophisticated campaigns using distribution techniques like Google Ads, ClickFix, compromised websites, and priority threat actors’ more targeted campaigns. 

Threat actors 

Proofpoint first began tracking Rhadamanthys in December 2022 when it was distributed in a campaign attributed to priority cybercriminal threat actor TA571 with post exploitation activities attributed to TA866. TA571 has used both exclusive and more freely available malware, but TA866 has historically been observed using more exclusive and distinct malware. The actors’ use of Rhadamanthys immediately designated it as a priority malware to tracked.  

Proofpoint subsequently observed TA2541, a capable actor classified on a lower tier who favors off-the-shelf RATs, use Rhadamanthys in February 2022. TA547, a priority threat actor who has used sophisticated banking malware and loaders, leveraged Rhadamanthys throughout 2024. TA585, a newly designated actor suspected of operating their entire attack chain through malware delivery, utilized Rhadamanthys frequently in 2025. In addition to the designated threat actors tracked by Proofpoint, the malware has been used in a large number of unattributed activity clusters in Proofpoint data, including the threat actor tracked by third-parties as “Aggah”, and by other threat actors tracked externally in distributing malware via other mediums like malvertising or SEO poisoning.  

Actors across the crimeware spectrum from low-level actors to sophisticated operators using Rhadamanthys consistently over time demonstrates the apparent success of the malware as a product, the malware’s evolution and evasion efforts, and the successful MaaS strategy employed by its operators. 

Malware 

Threat actors may distribute Rhadamanthys as the sole malware payload, a companion malware delivered with others, or as a follow-on payload. In Proofpoint data, Rhadamanthys is frequently used in campaigns distributed by loaders. For example, we’ve seen the following drop Rhadamanthys as a follow-on payload: 

SystemBC 
DarkGate 
GuLoader 
SmartLoader 
Resident Backdoor 
DoubleLoader 
DOILoader / Hijack Loader 
Latrodectus 
CastleLoader 
Amadey 

Proofpoint researchers have also observed Rhadamanthys delivered in campaigns as a companion to other malware, including:

Remcos 
zgRAT 
Screenshotter / AHK Bot  
BitRAT 
XWorm 
Lumma 
XLoader 

In these campaigns, Rhadamanthys is either delivered at the same time as other payloads, or is distributed to a limited target set within a broader campaign that drops multiple payloads to different recipients.  

Recent attack chains 

Rhadamanthys is currently distributed by multiple threat actors using many different attack chains to deliver malware. The following are a small sample of some of the most interesting campaigns Proofpoint researchers observed in recent months.  

Compromised websites 

Multiple threat clusters use compromised websites to distribute Rhadamanthys. In email data, we observe these messages because they contain links to compromised websites. Although neither the sender nor the site owner may intend harm, the websites have been compromised with a malicious injection.  

In a campaign observed in October 2025, the injection prompted the website to load a malicious script which was hosted on actor-operated infrastructure, which, in turn loaded a counterfeit Cloudflare turnstile. Upon validation the browser switched to full screen and display a fake security update lure. 

Figure 3. Cloudflare verification. 

Figure 4. Fake update ClickFix instructions. 

This attack chain used a technique called “Clickfix” which instructs the user to copy and paste a malicious command in the run box. In this way, the attacker is essentially tricking the user to infect themselves with malware. Many web inject campaigns use this technique. In this case, if the command was run, it would lead to the installation of Rhadamanthys. 

URLs 

Rhadamanthys payload delivery via URLs in emails is also common. For example, Proofpoint identified a campaign in October impersonating a logistics company. Messages contained URLs leading to a website instructing the recipient to sign a form and click “submit”. Then, the user would be redirected to a ClickFix landing page.  

Figure 5. Impersonated company landing page with a fake confirmation. 

Figure 6. ClickFix instructions. 

If the target completed the ClickFix steps as instructed, a command was initiated to download a tar archive and run CastleLoader. CastleLoader was observed loading DOILoader and Rhadamanthys. DOILoader was observed loading zgRAT.  

This campaign aligns with an increase in threat actors targeting the surface transportation industry to deliver malware or remote monitoring and management (RMM) tools.  

PDFs 

Another interesting campaign in August and September impersonated YouTube and targeted organizations in the entertainment and media industries. The messages contained a PDF with a link to a fake “Youtube DMCA” themed website built with Lovable App and used the ClickFix technique.  

Figure 7. Fake YouTube “copyright appeal” website created by threat actors. 

The app instructed recipients to enter their YouTube URL, retrieved real-time metadata for any submitted YouTube channel, and claimed that an appeal is needed. If the instructions were followed and the user copied and pasted the PowerShell script as directed, it executed an HTA script. The HTA enabled VBA macros via registry changes and built an Excel workbook via COM in-memory, opening it silently without user interaction. The workbook contained an AutoOpen macro, which the HTA constructed from split Base64 strings. This macro downloaded a .bin file containing shellcode and executed it via classic shellcode injection using VirtualAlloc + RtlMoveMemory + CreateThread into the Excel process to run Rhadamanthys in memory. While the macro included logic for both 32- and 64-bit Office, it only downloaded and ran 64-bit shellcode, so it crashed on 32-bit Excel. 

The payload chain from HTA to shellcode execution was likely built with the commercial toolkit MacroPack Pro which is sold to red teams and “ethical hackers”. 

Impact 

In general, disruptions to cybercrime threat actors and their malware have ripple effects across the ecosystem. Threat actors who rely on Rhadamanthys will have to find a new malware for distribution and spend time and money retooling their attack chains. It is possible that threat actors may pivot to newer malware such as Amatera Stealer, Monster V2, or CastleRAT. But while there may be other options tooling-wise, disruptions also sow distrust among the criminal ecosystem, and in some cases, lead to more restrictive policies and tighter controls about who can buy malware from certain brokers.  

Proofpoint will continue to monitor where Rhadamanthys threat actors go next and continue defending against cybercriminal threats.  

Conclusion 

As law enforcement disruptions continue to alter threat actors’ behavior, it’s important to be aware of emerging trends and behaviors from prominent cybercriminal threat actors, such as the use of remote monitoring and management software (RMMs), increase in use of information stealers, and new social engineering techniques that target people not technology. By understanding the landscape, organizations can implement defenses against emerging trends and anticipate what decisions threat actors will make to stay ahead of them. 

Proofpoint’s mission is to provide the best human-centric protection for our customers against advanced threats. Whenever it is possible and appropriate to do so, and as is the case with Operation Endgame, Proofpoint uses its team’s knowledge and skills to help protect a wider audience against widespread malware threats. Proofpoint was proud to assist in the law enforcement investigations into Rhadamanthys activity. 

Through its unique vantage point, Proofpoint is able to identify the largest and most consequential malware distribution campaigns, providing the authorities with much-needed insight into the biggest threats to society, affecting the greatest number of people around the world. 

Proofpoint Threat Research would like to thank Pim Trouerbach for his collaboration on investigations into Rhadamanthys and related malware. 

Emerging Threats signatures 

2864521 

Rhadamanthys CnC Domain in DNS Lookup 

2864523 

Observed Rhadamanthys CnC Domain in TLS SNI 

2864294 

Observed Malicious SSL Cert (Rhadamanthys) 

2862244 

Observed Malicious SSL Cert (Rhadamanthys) 

2862245 

Observed Malicious SSL Cert (Rhadamanthys) 

2054665 

Win32/Rhadamanthys CnC Activity (GET) 

2854802 

Suspected Rhadamanthys Related SSL Cert 

2043202 

Rhadamanthys Stealer – Payload Download Request 

2853001 

Rhadamanthys Stealer – Payload Response 

2853002 

Rhadamanthys Stealer – Data Exfil 

 

Example indicators of compromise 

Indicator 

Description 

First Seen 

13f0bf908679bea560806fd3c14ef581b3cadbab2ff07a6adf04d97995924707 

shielders.msi  

SHA256 

25 August 2025 

b0c9d619256fdf220fbb39945fac5a040b5e836f1eae0459b4fcbf2b451420a7 

DpiChrysler.exe 

SHA256 

25 August 2025 

hxxps://84[.]200[.]80[.]8/gateway/53c06hop.fp0g1 

Rhadamanthys C2 

25 August 2025 

security[.]flacergurad[.]com 

Actor-Controlled Intermediate Domain 

25 August 2025 

security[.]flaegrudad[.]com 

Actor-Controlled Intermediate Domain 

25 August 2025 

security[.]flaezguerad[.]com 

Actor-Controlled Intermediate Domain 

25 August 2025 

security[.]flaezguered[.]com 

Actor-Controlled Intermediate Domain 

25 August 2025 

security[.]flavregurads[.]com 

Actor-Controlled Intermediate Domain 

25 August 2025 

security[.]flheregurend[.]com 

Actor-Controlled Intermediate Domain 

25 August 2025 

security[.]flqaergwaard[.]com 

Actor-Controlled Intermediate Domain 

25 August 2025 

security[.]flsaregursd[.]com 

Actor-Controlled Intermediate Domain 

25 August 2025 

security[.]gueradflwre[.]com 

Actor-Controlled Intermediate Domain 

25 August 2025 

theguardshield[.]com 

Actor-Controlled Intermediate Domain 

25 August 2025 

flheregurend[.]com 

Actor-Controlled Intermediate Domain 

25 August 2025 

flsaregursd[.]com 

Actor-Controlled Intermediate Domain 

25 August 2025 

flaezguerad[.]com 

Actor-Controlled Intermediate Domain 

25 August 2025 

flaezguered[.]com 

Actor-Controlled Intermediate Domain 

25 August 2025 

flcreagurade[.]com 

Actor-Controlled Intermediate Domain 

25 August 2025 

theguardshield[.]com 

Actor-Controlled Intermediate Domain 

25 August 2025 

flnaresgurard[.]com 

Actor-Controlled Intermediate Domain 

25 August 2025 

flaxergaurds[.]com 

Actor-Controlled Intermediate Domain 

25 August 2025 

cloudwardena[.]com 

Actor-Controlled Intermediate Domain 

25 August 2025 

flenieregurd[.]com 

Actor-Controlled Intermediate Domain 

25 August 2025 

Budparbanjarnegara[.]com 

ClickFix Payload Domain 

25 August 2025 

hxxps://google[.]strike-submit[.]com/DMCA_Notice.hta 

Payload URL 

30 August 2025 

hxxps://google[.]strike-submit[.]com/DMCA_Notice[.]hta 

ClickFix Payload URL 

30 August 2025 

hxxps://google[.]strike-submit[.]com/agreeses[.]bin 

ClickFix Payload URL 

30 August 2025 

bc2508708feb0ccc652494f8e28620bd871a8b6e1d26c7cdd61ab070f2594bbc 

ClickFix Payload SHA256 

30 August 2025 

ccdd8a6dc97eeba07e586f059eae7944dd767519f2c3b2233ff90d3dc4e8e3f0 

ClickFix Payload SHA256 

30 August 2025 

hxxps://85[.]192[.]61[.]140/gateway/h2u7sp2d[.]ab87a 

Rhadamanthys C2 

30 August 2025 

hxxps://policy[.]video 

Optional Initial Redirecror in PDFs 

30 August 2025 

hxxps://support-review[.]org/ 

Optional Initial Redirecror in PDFs 

30 August 2025 

hxxps://appeal[.]strike-submit[.]com 

 

ClickFix Landing Example 

30 August 2025 

support-review[.]org 

Actor-Controlled Domain 

30 August 2025 

trust-review[.]org 

Actor-Controlled Domain 

30 August 2025 

compliance-review[.]org 

Actor-Controlled Domain 

30 August 2025 

channel-review[.]org 

Actor-Controlled Domain 

30 August 2025 

application-review[.]org 

Actor-Controlled Domain 

30 August 2025 

strike-submit[.]com 

Actor-Controlled Domain 

30 August 2025 

submit-appeal[.]com 

Actor-Controlled Domain 

30 August 2025 

policy[.]video 

Actor-Controlled Domain 

30 August 2025 

tdsworkout[.]com 

Example Web Inject 

20 October 2025 

103[.]136[.]68[.]61 

Example Web Inject 

20 October 2025 

cashorix[.]xyz 

Web Inject Domain 

20 October 2025 

xpoalswwkjddsljsy[.]com 

Filtered Landing Page 

20 October 2025 

galaxyswapper[.]pro 

Filtered Landing Page 

20 October 2025 

193[.]24[.]211[.]233 

Filtered Landing Page 

20 October 2025 

hxxp://141[.]0x62[.]80[.]175/kick[.]dat 

ClickFix Payload (HTA) 

20 October 2025 

141[.]98[.]80[.]175 

ClickFix Payload (HTA) 

20 October 2025 

ff14b28408121ebe4a5d0c2f14b9dc99e987e89b56392dc214481197d4815456 

ClickFix Payload (HTA) SHA256 

20 October 2025 

http://xoiiasdpsdoasdpojas[.]com/ 

ClickFix Payload (PS1) 

20 October 2025 

xoiiasdpsdoasdpojas[.]com 

ClickFix HTA Payload (PS1) 

20 October 2025 

141[.]98[.]80[.]175 

ClickFix HTA Payload (PS1) 

20 October 2025 

c9026ffc02f11204ac1eb1183376a5cee74f7897d948bdcd59c06f31de2671fa 

ClickFix HTA Payload (PS1) 

SHA256 

20 October 2025 

193[.]221[.]200[.]93 

Rhadamanthys C2 

20 October 2025 Proofpoint Threat InsightRead More