Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
CloudZ RAT Steals SMS OTPs via Microsoft Phone Abuses Link
May 6, 2026
QLNX Credential Theft Targets Developers for Supply Chain Comprom
May 6, 2026
MajorDoMo RCE Vulnerability Exposes Servers Code Execution
May 6, 2026
Home/Threats/Hackers Push CrystalX Malware-as-a-Service Through Telegram With
Threats

Hackers Push CrystalX Malware-as-a-Service Through Telegram With

CrystalX, a potent new Malware-as-a-Service (MaaS) offering, is now openly marketed to cybercriminals via private Telegram channels. This dangerous malware, detailed in CrystalX did not appear out of...

Marcus Rodriguez
Marcus Rodriguez
April 1, 2026 3 Min Read
1 0

CrystalX, a potent new Malware-as-a-Service (MaaS) offering, is now openly marketed to cybercriminals via private Telegram channels. This dangerous malware, detailed in

CrystalX did not appear out of nowhere. It traces its roots back to January 2026, when a malware author began promoting a tool called Webcrystal RAT inside a private Telegram group used by RAT developers.

Early observers noted that the control panel layout looked nearly identical to a previously known tool called WebRAT, also referred to as Salat Stealer.

Both were written in Go, and the bot used to sell access keys closely matched the WebRAT infrastructure.

After receiving criticism that the tool was simply a copy, the developer rebranded it as CrystalX RAT, opened a dedicated Telegram channel packed with marketing activity including access key draws and polls, and even launched a YouTube channel to showcase the malware’s growing feature list.

WebRAT - Panel layout similarities (Source - Securelist)
WebRAT – Panel layout similarities (Source – Securelist)

Securelist analysts identified the active campaign and carried out a detailed technical analysis of the malware, noting that its feature set goes well beyond what most commercial RATs offer.

The tool is sold in three subscription tiers, giving buyers access to a web-based control panel filled with capabilities ranging from file exfiltration to live remote screen control.

What stands out most is the combination of serious espionage functions alongside an entire section of prank commands designed to harass and disrupt victims on demand. This unusual pairing makes CrystalX one of the more distinct threats seen in the MaaS space in recent months.

The malware’s reach is already growing. At the time of reporting, dozens of victims had been affected, with infection attempts recorded primarily in Russia.

CrystalX, however, carries no built-in geographic restrictions, meaning any subscriber can deploy it against targets anywhere in the world.

Kaspersky’s products detect this threat under multiple signatures, including Backdoor.Win64.CrystalX, Trojan.Win64.Agent, and Trojan.Win32.Agentb.gen.

Continued development of new implant versions signals that the malware is still being actively improved, and its subscriber base is likely to grow as the attacker ramps up promotional efforts.

Detection Evasion and Anti-Analysis Tactics

One of the more technically refined aspects of CrystalX is how it works to avoid detection.

Each implant is compressed using zlib and then encrypted with the ChaCha20 algorithm, using a hard-coded 32-byte key and a 12-byte nonce, which makes static analysis significantly harder.

The auto-builder provided with the control panel allows operators to configure anti-analysis features at the build stage, including selective geoblocking by country and custom executable icons.

During execution, CrystalX runs a series of checks to determine whether it is operating in an analysis environment.

It reads a Windows registry value to detect if a proxy tool such as Fiddler, Burp Suite, or mitmproxy is active, and blacklists their process names accordingly.

A separate virtual machine detection routine examines running processes, installed guest tools, and hardware characteristics to confirm it is indeed running on a real system.

An anti-attach loop continuously monitors the debug flag, debug port, hardware breakpoints, and program execution timing to catch any debugger attachment attempt.

Additionally, the malware patches critical Windows functions, including AmsiScanBuffer, EtwEventWrite, and MiniDumpWriteDump, disabling security instrumentation and memory dumping tools that analysts regularly rely on during investigations.

CrystalX RAT Implants (Source - Securelist)
CrystalX RAT Implants (Source – Securelist)

Once it clears these checks, CrystalX connects to its command-and-control server via a hard-coded WebSocket URL and begins collecting system data.

The known C2 domains are webcrystal.lol, webcrystal.sbs, and crystalxrat.top. Organizations should block these domains at the network perimeter, monitor for unusual outbound WebSocket connections, and investigate any executable displaying the anti-debug behaviors described above.

Keeping endpoint protection tools regularly updated remains one of the most practical steps to catch threats like CrystalX before they can establish a foothold.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerMalwarePatchSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

ShinyHunters Claim Alleged Cisco Source Code & Data

Next Post

Hackers Hide Malware Infrastructure Using EtherRAT on Ethereum

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Prolific Russian Ransomware Member Sentenced to Group Months
May 6, 2026
Detect Phishing-to-RMM Attacks Analysts Trusted-Tool
May 6, 2026
Hackers Exploit Microsoft Teams to Steal Credentials &
May 6, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us