In brief
- A new malware campaign uses fake PDF to DOCX converters as a vector.
- Victims are tricked into executing a PowerShell command, installing SectopRAT variant Arechclient2.
- The malware can lift seed phrases and tap into Web3 APIs to drain assets.
A malware campaign is using fake PDF to DOCX converters as a vector for sneaking malicious PowerShell commands onto machines, enabling the attacker to access crypto wallets, hijack browser credentials and steal information.
Following an FBI alert last month, CloudSEK Security Research team has carried out an investigation revealing details about the attacks.
The goal is to trick users into executing a PowerShell command which installs the Arechclient2 malware, a variant of SectopRAT, an information stealing family known to harvest sensitive data from victims.
The malicious websites impersonate that of legitimate file converter PDFCandy, but instead of loading the real software, the malware is downloaded. The site features loading bars and even CAPTCHA verification in order to lull users into a false sense of security.
Ultimately, after several redirects, the victim’s machine downloads an "adobe.zip" file containing the payload—exposing the device to the Remote Access Trojan, which has been active since 2019.
This leaves users open to data theft, including browser credentials and cryptocurrency wallet information.
The malware “checks extension stores, lifts seed phrases, and even taps into Web3 APIs to ghost-drain assets post-approval,” Stephen Ajayi, Dapp Audit Technical Lead at blockchain security firm Hacken, told Decrypt.
CloudSEK advised people to use antivirus and antimalware software, and to "Verify file types beyond just extensions, as malicious files often masquerade as legitimate document types."
The cybersecurity firm also advises that users rely on “trusted, reputable file conversion tools from official websites rather than searching for 'free online file converters'," and to consider using “offline conversion tools that don't require uploading files to remote servers."

Kaspersky Flags Malware on SourceForge That Tricks Victims Into Sending Attackers Their Crypto
Cybersecurity firm Kasperky has discovered a malware which tricks victims into sending attackers their crypto by replacing trusted wallet addresses on a users' clip board. The malware is being distributed under the guise of Microsoft Office Add-Ins on the SourceForge website. In reality, alternate links are being used to install this malware and infiltrate crypto wallets. The coding appears to be in Russian with an expected 90% of potential victims in Russia, Kaspersky researchers wrote in a pos...
Hacken’s Ajayi advised crypto users to remember that, “Trust is a spectrum, it’s earned, not given. In cybersecurity, assume nothing is safe by default.” He added that they should, “Apply a zero trust mindset, and keep your security stack up to date especially EDR and AV tools that can flag behavioral anomalies like rogue msbuild.exe activity.”
“Attackers evolve constantly and so should defenders,” Ajayi noted, adding that, “Regular training, situational awareness, and strong detection coverage are essential. Stay skeptical, prepare for worst-case scenarios, and always have a tested response playbook ready to go.”