Ransomware gangs use new Skitnet malware for stealthy network exploitation

Ransomware gangs use new Skitnet malware for stealthy network exploitation

Researchers at Prodaft are warning of growing adoption of a new stealthy malware dubbed Skitnet, also known as "Bossnet," among ransomware gangs to maintain covert access and control in compromised enterprise networks.

First advertised on underground forums like RAMP in April 2024, Skitnet has surged in popularity among ransomware groups in early 2025. Notably, the malware has been used in real-world attacks by operations including BlackBasta, which reportedly deployed it during Microsoft Teams phishing campaigns, and Cactus.

The attack chain begins with a Rust-based loader dropped onto the victim’s system. This loader decrypts and executes a ChaCha20-encrypted Nim payload, which establishes a DNS-based reverse shell for command-and-control (C2) communications. The shell initiates contact with randomized DNS queries, evading conventional network detection.

Once active, Skitnet spawns three threads to manage communication, one of which sends heartbeat DNS requests, another monitors and exfiltrates shell output, and a third listens for incoming commands via DNS and decrypts them.

Skitnet’s C2 panel offers attackers a real-time view of infected systems, including IP addresses, geolocation, and system status. Operators can issue commands through either HTTP or DNS channels, depending on operational needs.

Beyond the core functionality, Skitnet supports .NET-based in-memory PowerShell execution, allowing attackers to tailor post-exploitation actions and extend lateral movement or data theft.

Indicators of compromise (IoCs) for Skitnet are available in Prodaft’s GitHub repository.

Back to the list

Latest Posts

Cyber Security Week in Review: June 20, 2025

Cyber Security Week in Review: June 20, 2025

In brief: the Langflow, TP-Link and Zyxel flaws exploited in the wild, Russian hackers use ASPs to infiltrate victims’ email accounts, and more
20 June 2025
Russian-linked hackers exploit Google App passwords in email espionage campaign

Russian-linked hackers exploit Google App passwords in email espionage campaign

Victims were tricked into creating and sharing ASPs under the mistaken belief that they are enabling secure communication with the US Department of State.
19 June 2025
FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US

FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US

Using custom-developed malware, including ransomware such as LockerGoga, MegaCortex, HIVE and Dharma, the hackers encrypted data on corporate networks.
18 June 2025