Skip to content

Commit 857c04b

Browse files
authored
Merge pull request #11 from Slavetomints/add/infected-system-image
add(image): add infected system image to post
2 parents 5958806 + 3ccdbdd commit 857c04b

2 files changed

Lines changed: 3 additions & 0 deletions

File tree

_posts/2025-10-16-infostealer-turned-ransomware.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,9 @@ image:
2727
## Introduction
2828
On the 19th of August 2025, an individual –here-by referred to as “V”– requested help on an unnamed Cybersecurity-oriented Discord server, seeking assistance regarding the recovery of a ransomware-infected system. V had claimed to be searching for a supposed “fixer” for a cheat related to Fortnite’s Retrac. Upon further investigation and triaging of V’s system, we discovered the initial social engineering domain `hxxps[://]retracfix[.]vercel[.]app` and a corresponding YouTube video that directed victims to the aforementioned domain. The domain intends to serve malware under the guise of a “system fixer” and a patch for Project Retrac.
2929

30+
![the infected system](/assets/img/infostealer-turned-ransomware/infected_system.jpg)
31+
*V's infected system*
32+
3033
## Initial Evaluations
3134
During the initial investigation of the campaign, researchers at DeTraced identified the campaign as being led by a group of threat actors previously associated with the WebRAT malware. We are currently tracking this group as “Betray.” Upon identifying the potential threat actors, the investigation focused on the initial malware dropper, which was extracted from the domain linked to the infection.
3235

-226 Bytes
Loading

0 commit comments

Comments
 (0)