Latest Posts

Phantom Stealer Analysis: Inside the Two-Layer Attack Chain Hidden Behind a Windows DLL

13 May 2026

DarkAtlas Squad
Info stealer

Phantom Stealer Analysis: Inside the Two-Layer Attack Chain Hidden Behind a Windows DLL

Phantom Stealer is a two-layer Windows infostealer attack chain that uses a malicious pdh.dll loader, process hollowing into jsc.exe, aggressive anti-analysis checks, browser and wallet theft, and a cryptocurrency clipper to steal credentials, financial data, and crypto-related assets while maintaining stealth and persistence. Key Takeaways Introduction A threat actor recently deployed Phantom Stealer, a carefully […]

Salat Stealer Analysis: Go-Based RAT, C2 Resilience, and Info-Stealing Capabilities

06 May 2026

DarkAtlas Squad
DarkWeb

Salat Stealer Analysis: Go-Based RAT, C2 Resilience, and Info-Stealing Capabilities

Executive Overview Salat Stealer is a sophisticated Go-based Remote Access Trojan (RAT) with deep information-stealing capabilities. Rather than acting as a simple stealer, it functions as a full post-exploitation framework with features that include WebSocket/QUIC command-and-control (C2), remote shell access, desktop and webcam streaming, browser and crypto-wallet theft, keylogging, clipboard theft, and SOCKS5 pivoting. The […]

Beyond TTPs: A Better Way to Attribute APT Activity Through Campaign Linkage

03 May 2026

APT
DarkAtlas Squad

Beyond TTPs: A Better Way to Attribute APT Activity Through Campaign Linkage

Introduction Attribution in cyber threat intelligence has long been built around the concept of persistent adversary groups commonly labeled as Advanced Persistent Threats (APTs). These designations, widely used by organizations such as MITRE and leading threat intelligence vendors, attempt to cluster malicious activity under unified identities based on observed behaviors, infrastructure, and tooling. However, this […]

Categories

Discover the latest articles and insights on Dark Atlas

All
Threat Intelligence
Malware Analysis
Threat Profile
Infrastructure adversary hunting
Uncategorized
Image placeholder

Image placeholder

Image placeholder

Image placeholder

Image placeholder

Image placeholder

Image placeholder

Image placeholder

Image placeholder

Contact Us

Experience the power of #1 AI-Powered eXtended Cyber Intelligence Platform

Subscribe

New Security Updates Weekly!