New Phishing Campaign Targets Social Media Users And Threatens Legal Action

August 7, 2025

A sophisticated phishing campaign has been active since July 2024.

This campaign, tracked by Check Point under the name "CopyRh(ight)adamantys," leverages copyright infringement themes to deceive victims into downloading a new version of the Rhadamanthys information stealer.

Campaign targets include the United States, Europe, East Asia, and South America, and impersonates a wide range of companies - primarily from the entertainment, media, and technology sectors.

Each phishing email is tailored to the recipient, sent from a unique Gmail account, and written in the local language of the target.

The emails claim to be from legal representatives of well-known companies, accusing recipients of brand misuse on social media.

They instruct the recipient to remove the offending content via a password-protected file, which is actually a download link hosted on appspot.com. This link redirects to Dropbox or Discord, where a RAR archive can be downloaded.

The archive contains a legitimate executable vulnerable to DLL side-loading, a malicious DLL with the Rhadamanthys payload, and a decoy document. When the executable is run, it sideloads the DLL, initiating the malware deployment.

The Rhadamanthys version used in this campaign (v0.7) includes AI-powered optical character recognition (OCR) capabilities. The campaign's scale and sophistication suggest the use of AI tools and point to a financially motivated cybercrime group rather than a nation-state actor. The attackers' use of automated phishing tactics and diverse lures highlights their evolving strategies to increase success rates.

Source: https://thehackernews.com/2024/11/steelfox-and-rhadamanthys-malware-use.html

Commentary

In the above source, the phishing scam accuses the target of brand misuse.

Examples of the accusations include claims that the recipient has:

Users can identify phishing emails related to the Rhadamanthys malware campaign - like those in the "CopyRh(ight)adamantys" operation - by watching for several key red flags:

The final takeaway is that if you receive an email like this, do not download or open any attachments or click on links. Instead, verify the claim by contacting the company directly through other channels not in the email.

Finally, your opinion is important to us. Please complete the opinion survey: