• Disclaimer
  • Copyright
  • About Us
  • Privacy Policy for Netfest
  • Contact
  • Advertise
Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • News
    BGMI 3.7 Update mod (hack) apk is now available for download! Check out the Golden Moon theme, explore the new RONDO map, and get all the details you need to know.

    BGMI 3.7 Update mod (hack) apk is now available for download!

    In their latest cyberattack, North Korean hackers are taking advantage of a PowerShell exploit to hijack devices.

    In their latest cyberattack, North Korean hackers are taking advantage of a PowerShell exploit to hijack devices.

    Malicious machine learning models on Hugging Face exploit a flawed Pickle format to avoid detection.

    Malicious machine learning models on Hugging Face exploit a flawed Pickle format to avoid detection.

    India's Reserve Bank of India (RBI) has launched a unique "bank.in" domain aimed at tackling digital banking fraud.

    India’s Reserve Bank of India (RBI) has launched a unique “bank.in” domain aimed at tackling digital banking fraud.

    There's no need to be concerned about a delay for GTA 6 at this point, according to a source within Rockstar. (Image via Rockstar Games)

    There’s no need to be concerned about a delay for GTA 6 at this point, according to a source within Rockstar.

    DeepSeek R1 has been jailbroken to create scripts for ransomware development.

    DeepSeek R1 has been jailbroken to create scripts for ransomware development.

  • Review
    DeepSeek R1 has been jailbroken to create scripts for ransomware development.

    DeepSeek R1 has been jailbroken to create scripts for ransomware development.

    MSI GE66 Raider Review

    MSI GE66 Raider Review

    iPhone SE (2020) review

    iPhone SE (2020) review

    Samsung Galaxy S20 Review (Indian Variant)

    Samsung Galaxy S20 Ultra review

    Samsung Galaxy S20 Review (Indian Variant)

    Samsung Galaxy S20 Review (Indian Variant)

    OnePlus 8 Pro review

    OnePlus 8 Pro review

  • Gaming
    BGMI 3.7 Update mod (hack) apk is now available for download! Check out the Golden Moon theme, explore the new RONDO map, and get all the details you need to know.

    BGMI 3.7 Update mod (hack) apk is now available for download!

    There's no need to be concerned about a delay for GTA 6 at this point, according to a source within Rockstar. (Image via Rockstar Games)

    There’s no need to be concerned about a delay for GTA 6 at this point, according to a source within Rockstar.

    BGMI 120 FPS APK AVAILABLE FOR DOWNLOAD

    BGMI 120 FPS APK AVAILABLE FOR DOWNLOAD

    BGMI Cover-Credits:  pxfuel. com

    zero recoil sensitivity bgmi code for android

    BGMI Mod Apk Review: Features and Benefits Explained

    Installing the BGMI Mod Apk 3.6.0 (ESP, Aimbot, Menu)

    For free, you may get the BGMI iOS App from the following link: Is BFMI iOS Download for free in 2 GB Ram? The complete list of iPhones

    For free, you may get the BGMI iOS App from the following link: Is BFMI iOS Download for free in 2 GB Ram? The complete list of iPhones

  • Gear
    • All
    • Camera
    • Laptop
    • Smartphone
    Samsung Galaxy S24 Plus Under ₹60,000: Check Offer Details

    Check out the latest price for the Samsung Galaxy S24 Plus at Flipkart’s Monumental Sale, which is 40% off.

    Amazon does not want you to read this Kindle jailbreak tutorial. netfest.in

    Amazon does not want you to read this Kindle jailbreak tutorial.

    oneplus 13 / oneplus 13R review

    Oneplus 13/13R Review-Are you considering upgrading? Here are several reasons why the OnePlus 13 and 13R are essential.

    Oneplus 13 / oneplus 13R review

    Phones Arriving in January 2025: From the OnePlus 13 to the Samsung Galaxy S25 Series

    BGMI Cover-Credits:  pxfuel. com

    zero recoil sensitivity bgmi code for android

    Realme X7 India Date Out , India Price 14.999? Confirms Company's CEO

    Realme X7 India Date Out , India Price 14.999? Confirms Company’s CEO

  • Computers
    Apple Intelligence is set to launch in India this April, starting with the English language.

    Apple Intelligence is set to launch in India this April, starting with the English language.

    Microsoft lists features removed in Windows 10 version 2004

    Microsoft lists features removed in Windows 10 version 2004

    Ubuntu 20.10 Release Date & Planned Features

    Ubuntu 20.10 Release Date & Planned Features

    MSI GE66 Raider Review

    MSI GE66 Raider Review

    MSI Creator 17 is the first Mini LED laptop in the world

    MSI Creator 17 is the first Mini LED laptop in the world

    Microsoft offers $100,000 to hack its custom Linux OS

    Microsoft offers $100,000 to hack its custom Linux OS

  • Applications
    Download TallyPrime 6.0 Beta and enjoy early access!

    Download TallyPrime 6.0 Beta and enjoy early access!

    "Step-by-Step Guide to Installing Kubernetes on Ubuntu 24.04/24.10"

    Step-by-Step Guide to Installing Kubernetes on Ubuntu 24.04

    Windows 11 KB5050021 23H2 has been released, bringing new features along with a direct download option for the .msu file.

    Windows 11 KB5050021 23H2 has been released, bringing new features along with a direct download option for the .msu file.

    For free, you may get the BGMI iOS App from the following link: Is BFMI iOS Download for free in 2 GB Ram? The complete list of iPhones

    For free, you may get the BGMI iOS App from the following link: Is BFMI iOS Download for free in 2 GB Ram? The complete list of iPhones

    Microsoft is teasing a new Windows 10 Start Menu

    Microsoft is teasing a new Windows 10 Start Menu

    Microsoft lists features removed in Windows 10 version 2004

    Microsoft lists features removed in Windows 10 version 2004

  • Security
    In their latest cyberattack, North Korean hackers are taking advantage of a PowerShell exploit to hijack devices.

    In their latest cyberattack, North Korean hackers are taking advantage of a PowerShell exploit to hijack devices.

    Malicious machine learning models on Hugging Face exploit a flawed Pickle format to avoid detection.

    Malicious machine learning models on Hugging Face exploit a flawed Pickle format to avoid detection.

    Broadcom has released patches for vulnerabilities in VMware Aria, as these exploits could potentially result in credential theft.

    Broadcom has released patches for vulnerabilities in VMware Aria, as these exploits could potentially result in credential theft.

    GitHub Desktop has a vulnerability that can lead to credential leaks through malicious remote URLs.

    GitHub Desktop has a vulnerability that can lead to credential leaks through malicious remote URLs.

    RANsacked: More than 100 security flaws detected in LTE and 5G network configurations.

    RANsacked: More than 100 security flaws detected in LTE and 5G network configurations.

    Uncover Concealed Browsing Dangers: Complimentary Risk Evaluation for GenAI, Identity, Web, and SaaS Vulnerabilities.

    Uncover Concealed Browsing Dangers: Complimentary Risk Evaluation for GenAI, Identity, Web, and SaaS Vulnerabilities.

No Result
View All Result
  • Home
  • News
    BGMI 3.7 Update mod (hack) apk is now available for download! Check out the Golden Moon theme, explore the new RONDO map, and get all the details you need to know.

    BGMI 3.7 Update mod (hack) apk is now available for download!

    In their latest cyberattack, North Korean hackers are taking advantage of a PowerShell exploit to hijack devices.

    In their latest cyberattack, North Korean hackers are taking advantage of a PowerShell exploit to hijack devices.

    Malicious machine learning models on Hugging Face exploit a flawed Pickle format to avoid detection.

    Malicious machine learning models on Hugging Face exploit a flawed Pickle format to avoid detection.

    India's Reserve Bank of India (RBI) has launched a unique "bank.in" domain aimed at tackling digital banking fraud.

    India’s Reserve Bank of India (RBI) has launched a unique “bank.in” domain aimed at tackling digital banking fraud.

    There's no need to be concerned about a delay for GTA 6 at this point, according to a source within Rockstar. (Image via Rockstar Games)

    There’s no need to be concerned about a delay for GTA 6 at this point, according to a source within Rockstar.

    DeepSeek R1 has been jailbroken to create scripts for ransomware development.

    DeepSeek R1 has been jailbroken to create scripts for ransomware development.

  • Review
    DeepSeek R1 has been jailbroken to create scripts for ransomware development.

    DeepSeek R1 has been jailbroken to create scripts for ransomware development.

    MSI GE66 Raider Review

    MSI GE66 Raider Review

    iPhone SE (2020) review

    iPhone SE (2020) review

    Samsung Galaxy S20 Review (Indian Variant)

    Samsung Galaxy S20 Ultra review

    Samsung Galaxy S20 Review (Indian Variant)

    Samsung Galaxy S20 Review (Indian Variant)

    OnePlus 8 Pro review

    OnePlus 8 Pro review

  • Gaming
    BGMI 3.7 Update mod (hack) apk is now available for download! Check out the Golden Moon theme, explore the new RONDO map, and get all the details you need to know.

    BGMI 3.7 Update mod (hack) apk is now available for download!

    There's no need to be concerned about a delay for GTA 6 at this point, according to a source within Rockstar. (Image via Rockstar Games)

    There’s no need to be concerned about a delay for GTA 6 at this point, according to a source within Rockstar.

    BGMI 120 FPS APK AVAILABLE FOR DOWNLOAD

    BGMI 120 FPS APK AVAILABLE FOR DOWNLOAD

    BGMI Cover-Credits:  pxfuel. com

    zero recoil sensitivity bgmi code for android

    BGMI Mod Apk Review: Features and Benefits Explained

    Installing the BGMI Mod Apk 3.6.0 (ESP, Aimbot, Menu)

    For free, you may get the BGMI iOS App from the following link: Is BFMI iOS Download for free in 2 GB Ram? The complete list of iPhones

    For free, you may get the BGMI iOS App from the following link: Is BFMI iOS Download for free in 2 GB Ram? The complete list of iPhones

  • Gear
    • All
    • Camera
    • Laptop
    • Smartphone
    Samsung Galaxy S24 Plus Under ₹60,000: Check Offer Details

    Check out the latest price for the Samsung Galaxy S24 Plus at Flipkart’s Monumental Sale, which is 40% off.

    Amazon does not want you to read this Kindle jailbreak tutorial. netfest.in

    Amazon does not want you to read this Kindle jailbreak tutorial.

    oneplus 13 / oneplus 13R review

    Oneplus 13/13R Review-Are you considering upgrading? Here are several reasons why the OnePlus 13 and 13R are essential.

    Oneplus 13 / oneplus 13R review

    Phones Arriving in January 2025: From the OnePlus 13 to the Samsung Galaxy S25 Series

    BGMI Cover-Credits:  pxfuel. com

    zero recoil sensitivity bgmi code for android

    Realme X7 India Date Out , India Price 14.999? Confirms Company's CEO

    Realme X7 India Date Out , India Price 14.999? Confirms Company’s CEO

  • Computers
    Apple Intelligence is set to launch in India this April, starting with the English language.

    Apple Intelligence is set to launch in India this April, starting with the English language.

    Microsoft lists features removed in Windows 10 version 2004

    Microsoft lists features removed in Windows 10 version 2004

    Ubuntu 20.10 Release Date & Planned Features

    Ubuntu 20.10 Release Date & Planned Features

    MSI GE66 Raider Review

    MSI GE66 Raider Review

    MSI Creator 17 is the first Mini LED laptop in the world

    MSI Creator 17 is the first Mini LED laptop in the world

    Microsoft offers $100,000 to hack its custom Linux OS

    Microsoft offers $100,000 to hack its custom Linux OS

  • Applications
    Download TallyPrime 6.0 Beta and enjoy early access!

    Download TallyPrime 6.0 Beta and enjoy early access!

    "Step-by-Step Guide to Installing Kubernetes on Ubuntu 24.04/24.10"

    Step-by-Step Guide to Installing Kubernetes on Ubuntu 24.04

    Windows 11 KB5050021 23H2 has been released, bringing new features along with a direct download option for the .msu file.

    Windows 11 KB5050021 23H2 has been released, bringing new features along with a direct download option for the .msu file.

    For free, you may get the BGMI iOS App from the following link: Is BFMI iOS Download for free in 2 GB Ram? The complete list of iPhones

    For free, you may get the BGMI iOS App from the following link: Is BFMI iOS Download for free in 2 GB Ram? The complete list of iPhones

    Microsoft is teasing a new Windows 10 Start Menu

    Microsoft is teasing a new Windows 10 Start Menu

    Microsoft lists features removed in Windows 10 version 2004

    Microsoft lists features removed in Windows 10 version 2004

  • Security
    In their latest cyberattack, North Korean hackers are taking advantage of a PowerShell exploit to hijack devices.

    In their latest cyberattack, North Korean hackers are taking advantage of a PowerShell exploit to hijack devices.

    Malicious machine learning models on Hugging Face exploit a flawed Pickle format to avoid detection.

    Malicious machine learning models on Hugging Face exploit a flawed Pickle format to avoid detection.

    Broadcom has released patches for vulnerabilities in VMware Aria, as these exploits could potentially result in credential theft.

    Broadcom has released patches for vulnerabilities in VMware Aria, as these exploits could potentially result in credential theft.

    GitHub Desktop has a vulnerability that can lead to credential leaks through malicious remote URLs.

    GitHub Desktop has a vulnerability that can lead to credential leaks through malicious remote URLs.

    RANsacked: More than 100 security flaws detected in LTE and 5G network configurations.

    RANsacked: More than 100 security flaws detected in LTE and 5G network configurations.

    Uncover Concealed Browsing Dangers: Complimentary Risk Evaluation for GenAI, Identity, Web, and SaaS Vulnerabilities.

    Uncover Concealed Browsing Dangers: Complimentary Risk Evaluation for GenAI, Identity, Web, and SaaS Vulnerabilities.

No Result
View All Result
NetFest
No Result
View All Result

Researchers Use AMSI Evasion Techniques and UAC Bypass to Expose NonEuclid RAT

Nimesh Dama by Nimesh Dama
08/01/2025
145 6
Home News
Share on FacebookShare on Twitter

Researchers studying cybersecurity have discovered a new remote access virus known as NonEuclid that gives malicious actors the ability to take over infected Windows devices from a distance.

According to a technical report released last week, “The NonEuclid remote access trojan (RAT), created in C#, is a very complex virus enabling unauthorised remote access with extensive evasion strategies,” Cyfirma stated.

“It uses a number of techniques, such as ransomware encryption that targets important data, privilege escalation, antivirus bypass, and anti-detection.”

rat02 16
Researchers Use AMSI Evasion Techniques and UAC Bypass to Expose NonEuclid RAT 45

Since at least late November 2024, NonEuclid has been promoted in underground forums; talks and tutorials regarding the malware have been seen on well-known websites like YouTube and Discord. This suggests a deliberate attempt to disseminate the virus as a countermeasure against crimeware.

Fundamentally, the RAT starts with a client application initialization phase, then runs a number of tests to avoid detection before configuring a TCP socket to communicate with a given IP and port.

Additionally, it monitors processes like “taskmgr.exe,” “processhacker.exe,” and “procexp.exe,” which are frequently used for analysis and process management, and sets up Microsoft Defender Antivirus exclusions to stop the security tool from identifying the artifacts.

“CreateToolhelp32Snapshot, Process32First, and Process32Next are Windows API calls that are used to enumerate processes and determine whether their executable names correspond to the designated targets,” Cyfirma stated. “If a match is detected, it either kills the process or causes the client program to leave, depending on the AntiProcessMode parameter.”

The virus employs a number of anti-analysis strategies, such as detecting whether it is operating in a virtual or sandboxed environment and stopping the program right away if it is. Additionally, it has tools to get around the Windows Antimalware Scan Interface (AMSI).

NonEuclid tries to increase privileges by evading User Account Control (UAC) safeguards and executing instructions, even though persistence is achieved through scheduled operations and Windows Registry modifications.

Its capacity to encrypt files with specific extension types (such as CSV, TXT, and PHP) and rename them with the suffix “. NonEuclid,” thereby transforming them into ransomware, is a rather unusual capability.

According to Cyfirma, “The NonEuclid RAT combines sophisticated stealth techniques, anti-detection features, and ransomware capabilities, exemplifying the increasing sophistication of current malware.”

Its extensive marketing on educational platforms, Discord channels, and underground forums shows how appealing it is to cybercriminals and emphasizes how difficult it is to counter such threats. The malware’s versatility in avoiding security measures is demonstrated by the incorporation of features including privilege escalation, AMSI bypass, and process blocking.

Amidst the labyrinth of digital defense mechanisms, cybercriminals continue to forge new tools to navigate the maze undetected. In a startling revelation, cybersecurity researchers have exposed a Remote Access Trojan (RAT) named NonEuclid, which stands out for its sophisticated evasion tactics. This malicious entity has been crafted to discreetly bypass User Account Control (UAC) and slip past the keen vigilance of the Antimalware Scan Interface (AMSI). This discovery underscores a harsh reality; as cyber defenses evolve, so too does the ingenuity of cyber threats.

**Sophisticated Evasion: NonEuclid RAT**

The NonEuclid RAT is designed to infiltrate Windows systems leveraging high-level evasion techniques. RATs, known for their ability to provide administrative control over a target device, are particularly dangerous due to their stealthy nature and vast capabilities once embedded into a system.

**Bypassing User Account Control**

One of the pivotal features of NonEuclid is its ability to circumvent UAC. This security infrastructure, intrinsic to Windows since Vista, prompts users for permission before allowing programs to make changes that require administrative privileges. By exploiting design flaws or using legitimate Windows tools in unexpected ways, NonEuclid silently elevates its permissions without tripping the UAC alarms.

**Eluding Antimalware Scan Interface**

More concerning is NonEuclid’s knack for evading AMSI, a Windows feature that allows security applications to analyze potentially harmful scripts. AMSI serves to intercept scripts at runtime to scan them for threats before they execute. NonEuclid bypasses AMSI by employing various obfuscation methods or by disrupting the scanning process, rendering the malicious code invisible to security software.

**Distribution and Infection Strategies**

The distribution methods for NonEuclid are diverse, employing conventional phishing schemes, malicious attachments, and exploiting known software vulnerabilities. As the RAT finds its way into a system, it creates a backdoor for attackers, allowing them to siphon off sensitive data or take complete control over the infected machine.

**Implications for Cybersecurity Measures**

The exposure of NonEuclid throws into sharp relief the necessity for adaptive and multilayered cybersecurity measures. Traditional antivirus solutions prove insufficient against such stealthy threats, prompting the need for advanced behavioral-based detection systems and heightened security awareness among users.

**Preventive Measures and Best Practices**

Recommendations from researchers urge both organizations and individual users to adopt stricter cyber hygiene practices. This includes regular updates of software, staff training to recognize sophisticated phishing tactics, and the use of advanced antivirus and antimalware tools with heuristic analysis capabilities.

**The Road Ahead for Digital Security**

As NonEuclid exemplifies the evolution of malware, the cybersecurity community must rekindle its commitment to innovation and vigilance. Building a robust defense in depth strategy with layered security controls, zero-trust principals, and ongoing threat intelligence research is paramount to outpace the tactical advancements of such intrusive software.

In conclusion, the emergence of the NonEuclid RAT is a stark reminder of the ongoing cat-and-mouse game between cyber attackers and defenders. The discovery should serve not as a cause for panic, but as a clarion call to reinforce and rethink digital defense mechanisms, keeping pace with the ever-shifting cybersecurity landscape. It is through shared knowledge, resilience, and the relentless pursuit of security enhancements that the digital realm can remain a bastion against the relentless tide of cyber threats.

20250108 Ymg5qsGwDi

Tags: " "processhacker.exe" and "procexp.exe"Researchers Use AMSI Evasion Techniques and UAC Bypass to Expose NonEuclid RAT"taskmgr.exe
Nimesh Dama

Nimesh Dama

Founder and Editor-in-Chief of 'NetFest News,' Nimesh is a cybersecurity analyst, Gadgets review, Tech News, Information Security professional, developer, and a white hat hacker

Next Post
skillindia netfest.in

Enroll in the free security analyst certificate course offered by Skill India starting in 2025.

Leave a ReplyCancel reply

Recommended

BGMI 3.7 Update mod (hack) apk is now available for download! Check out the Golden Moon theme, explore the new RONDO map, and get all the details you need to know.

BGMI 3.7 Update mod (hack) apk is now available for download!

15/02/2025
In their latest cyberattack, North Korean hackers are taking advantage of a PowerShell exploit to hijack devices.

In their latest cyberattack, North Korean hackers are taking advantage of a PowerShell exploit to hijack devices.

12/02/2025

Trending

BGMI 3.7 Update mod (hack) apk is now available for download! Check out the Golden Moon theme, explore the new RONDO map, and get all the details you need to know.

BGMI 3.7 Update mod (hack) apk is now available for download!

15/02/2025
BGMI Mod Apk Review: Features and Benefits Explained

Installing the BGMI Mod Apk 3.6.0 (ESP, Aimbot, Menu)

29/01/2025
"Step-by-Step Guide to Installing Kubernetes on Ubuntu 24.04/24.10"

Step-by-Step Guide to Installing Kubernetes on Ubuntu 24.04

28/01/2025
BGMI Cover-Credits:  pxfuel. com

zero recoil sensitivity bgmi code for android

31/12/2024
PUBG Mobile: How to register for the PUBG Mobile 0.19.0 beta update?

PUBG Mobile Redeem Codes: New Redeem Codes for May 22 today

23/05/2020
netfest.in logo

We bring you the best Premium Tech News,Review & Penetration Testing News, magazine, personal blog, etc. Check our landing page for details.

Categories

  • Apple
  • Applications
  • Camera
  • Computers
  • Course/Jobs
  • Gaming
  • Gear
  • Laptop
  • Microsoft
  • News
  • Review
  • Security
  • Smartphone
  • Uncategorized

Recent News

BGMI 3.7 Update mod (hack) apk is now available for download! Check out the Golden Moon theme, explore the new RONDO map, and get all the details you need to know.

BGMI 3.7 Update mod (hack) apk is now available for download!

15/02/2025
In their latest cyberattack, North Korean hackers are taking advantage of a PowerShell exploit to hijack devices.

In their latest cyberattack, North Korean hackers are taking advantage of a PowerShell exploit to hijack devices.

12/02/2025
  • Trending
  • Comments
  • Latest
BGMI 3.7 Update mod (hack) apk is now available for download! Check out the Golden Moon theme, explore the new RONDO map, and get all the details you need to know.

BGMI 3.7 Update mod (hack) apk is now available for download!

15/02/2025
BGMI Mod Apk Review: Features and Benefits Explained

Installing the BGMI Mod Apk 3.6.0 (ESP, Aimbot, Menu)

29/01/2025
BGMI 3.7 Update mod (hack) apk is now available for download! Check out the Golden Moon theme, explore the new RONDO map, and get all the details you need to know.

BGMI 3.7 Update mod (hack) apk is now available for download!

0
In their latest cyberattack, North Korean hackers are taking advantage of a PowerShell exploit to hijack devices.

In their latest cyberattack, North Korean hackers are taking advantage of a PowerShell exploit to hijack devices.

0
BGMI 3.7 Update mod (hack) apk is now available for download! Check out the Golden Moon theme, explore the new RONDO map, and get all the details you need to know.

BGMI 3.7 Update mod (hack) apk is now available for download!

15/02/2025
In their latest cyberattack, North Korean hackers are taking advantage of a PowerShell exploit to hijack devices.

In their latest cyberattack, North Korean hackers are taking advantage of a PowerShell exploit to hijack devices.

12/02/2025
  • Disclaimer
  • Copyright
  • About Us
  • Privacy Policy for Netfest
  • Contact
  • Advertise

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • News
  • Review
  • Apple
  • Applications
  • Computers
  • Gaming
  • Gear
    • Laptop
    • Camera
    • Smartphone
  • Microsoft
  • Smartphone

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.