About this Malware
Rhadamanthys Stealer uses staged loaders, obfuscated JavaScript, and anti-VM checks to collect credentials, cookies, wallet extensions, and host telemetry. Its operators frequently rotate infrastructure and payload builders. Exfiltrated data is curated into high-value logs for initial access brokering, account takeover, and downstream ransomware intrusion preparation across enterprise and consumer victims.
Rhadamanthys campaigns are known for operational maturity and frequent builder updates. That agility helps operators evade static signatures while keeping theft workflows stable. Domain-level exposure monitoring gives teams early warning when leaked records appear, even when endpoint telemetry is incomplete or delayed in distributed work environments.