CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◐ Insider Threat & DLP Apr 04, 2026

GOLD BLADE Exploiting Custom QWCrypt Locker for Data Exfiltration and Ransomware Deployment - cyberpress.org

cyberpress.org Archived Apr 04, 2026 ✓ Full text saved

GOLD BLADE Exploiting Custom QWCrypt Locker for Data Exfiltration and Ransomware Deployment cyberpress.org

Full text archived locally
✦ AI Summary · Claude Sonnet


    GOLD BLADE Exploiting Custom QWCrypt Locker for Data Exfiltration and Ransomware Deployment By Priya December 9, 2025 Categories: Cyber Security NewsRansomware Between February 2024 and August 2025, Sophos threat analysts identified nearly 40 intrusions linked to campaign STAC6565, attributed with high confidence to the GOLD BLADE threat group also tracked as RedCurl, RedWolf, and Earth Kapre. Once known for espionage operations, GOLD BLADE has evolved into a hybrid actor that combines data theft, credential harvesting, and selective ransomware deployment using its proprietary QWCrypt locker. Nearly 80% of the campaign’s targets were Canada-based organizations, primarily in the services, manufacturing, retail, and technology sectors. The group has shifted from classic spearphishing to a novel social engineering tactic that exploits recruitment platforms such as Indeed, JazzHR, and ADP WorkforceNow. Instead of sending malicious emails, attackers upload weaponized resumes as PDFs directly to recruitment portals, exploiting HR departments’ trust in these systems. Upon viewing the documents, victims are redirected to fake “Safe Resume Share Service” pages that serve RedLoader malware, initiating a multi-stage compromise. Multi-Stage RedLoader Chain and BYOVD Evasion The RedLoader infection chain observed by Sophos evolved through three stages: initial execution, secondary payload deployment, and final installation. Early variants employed .lnk and .iso delivery methods, while later attacks in 2025 combined remote DLL sideloading hosted on Cloudflare Workers domains (e.g., automatinghrservices[.]workers[.]dev). Each stage used browser-themed scheduled tasks to deploy payloads and maintain persistence, utilizing living-off-the-land binaries such as pcalua.exe for stealth execution. GOLD BLADE targeting by sector from February 2024 through August 2025 To maintain command and control, GOLD BLADE leveraged open-source RPivot and Chisel tunneling tools, establishing SOCKS proxies to C2 servers hosted on Cloudflare Workers and external IP infrastructure. Defense evasion employed a Bring Your Own Vulnerable Driver (BYOVD) technique, using modified Zemana AntiMalware drivers and customized Terminator utilities to disable EDR/XDR protections. Analysts discovered unique build paths in Terminator samples, revealing an organized ransomware toolkit and operational structure. In April and July 2025, GOLD BLADE executed QWCrypt ransomware deployments following data exfiltration. Delivered via encrypted 7-Zip archives, the ransomware appended .qwCrypt extensions and dropped ransom notes akin to LockBit styles. While Sophos CryptoGuard protected against many attacks, unprotected endpoints offered limited encryption. The incident demonstrated GOLD BLADE’s strategic ability to alternate between espionage-for-hire and direct financial extortion. Sophos detections for this campaign include Troj/Agent-BLEI, Troj/Ransom-HHH, and CXmal/KillAV-ZA. Key indicators include multiple Cloudflare Workers C2 domains, IP 109[.]206[.]236[.]209, and confirmed QWCrypt hashes such as 568352411deff640ba781ae55d98d657da02191d97e0466e6883b966dd1e77db. Organizations are advised to sandbox incoming resumes, strengthen endpoint monitoring, and deploy managed detection and response (MDR) solutions to detect evolving GOLD BLADE techniques. Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates Share Facebook Twitter Pinterest WhatsApp Priya Priya is a Security Reporter who tracks malware campaigns, exploit kits, and ransomware operations. Her reporting highlights technical indicators and attack patterns that matter to defenders Recent Articles New Progress ShareFile Vulnerabilities Enable Server Takeover with No Login Required Cyber Security News April 3, 2026 Microsoft Pushes Forced Upgrade to Windows 11 Version 24H2 for Unmanaged PCs Cyber Security News April 3, 2026 Infrastructure Engineer Pleads Guilty to Locking 254 Company Windows Servers Cyber Security News April 3, 2026 CISA Adds TrueConf Flaw to KEV Catalog Amid Active Exploitation Cyber Security News April 3, 2026 14,000+ F5 BIG-IP APM Instances Exposed as RCE Exploits Surge Cyber Security News April 3, 2026 Related Stories Cyber Security News New Progress ShareFile Vulnerabilities Enable Server Takeover with No Login Required AnuPriya - April 3, 2026 Cyber Security News Microsoft Pushes Forced Upgrade to Windows 11 Version 24H2 for Unmanaged PCs AnuPriya - April 3, 2026 Cyber Security News Infrastructure Engineer Pleads Guilty to Locking 254 Company Windows Servers AnuPriya - April 3, 2026 Cyber Security News CISA Adds TrueConf Flaw to KEV Catalog Amid Active Exploitation AnuPriya - April 3, 2026 Cyber Security News 14,000+ F5 BIG-IP APM Instances Exposed as RCE Exploits Surge AnuPriya - April 3, 2026 Cyber Attack Axios Maintainer Says npm Compromise Stemmed From Targeted Social Engineering Varshini - April 3, 2026 LEAVE A REPLY Comment: Name:* Email:* Website:
    💬 Team Notes
    Article Info
    Source
    cyberpress.org
    Category
    ◐ Insider Threat & DLP
    Published
    Apr 04, 2026
    Archived
    Apr 04, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗