Ransomware Gangs Adopt Skitnet Malware for Post-Exploitation Attacks in Enterprise Environments

Ransomware groups including BlackBasta and Cactus are using Skitnet malware for stealthy post-exploitation in enterprise networks, enabling persistence, data theft, and remote control.
Ransomware Gangs Adopt Skitnet Malware for Post-Exploitation Attacks in Enterprise Environments
Table of Contents
    Add a header to begin generating the table of contents

    Ransomware operators are increasingly adopting a stealthy post-exploitation malware called Skitnet (also known as “Bossnet”) to support advanced attacks inside compromised enterprise networks. Originally marketed on underground forums like RAMP in April 2024, Skitnet has seen significant adoption among threat groups in early 2025, according to research from Prodaft.

    The malware has been actively deployed in the wild by ransomware groups such as BlackBasta, which has used it in Microsoft Teams phishing attacks, and Cactus.

    Skitnet Malware: Technical Overview and Core Capabilities

    Skitnet infections begin with a Rust-based loader that drops and executes on a victim’s machine. This loader decrypts a ChaCha20-encrypted Nim binary, which is then loaded directly into memory.

    The Nim-based payload sets up a DNS-based reverse shell for communication with the command-and-control (C2) server. It initiates communication with randomized DNS queries and creates three active threads for the following functions:

    • Sending regular heartbeat signals via DNS
    • Exfiltrating shell output to the C2 server
    • Listening for and decrypting incoming commands from DNS replies

    Depending on C2 panel instructions, command delivery and data exchange may occur over HTTP or DNS. The Skitnet control interface provides visibility into the infected host’s IP address, location, operational status, and available command options.

    Supported C2 Commands

    Skitnet supports a variety of actions to maintain access and collect data:

    • startup – Ensures persistence by downloading a malicious DLL and creating a shortcut in the Startup folder that triggers a DLL hijack using a legitimate Asus executable. This launches a PowerShell script (pas.ps1) to continue C2 communication.
    • Screen – Takes a screenshot of the victim’s desktop via PowerShell, uploads it to Imgur, and sends the link back to the server.
    • Anydesk – Installs AnyDesk silently and removes traces from the tray icon and desktop window.
    • Rutserv – Installs RUT-Serv, another legitimate remote access tool, in stealth mode.
    • Shell – Opens a PowerShell loop. The malware polls the server every five seconds for new commands and executes them using Invoke-Expression.
    • Av – Lists all installed antivirus and endpoint protection software using WMI queries and reports the data back to the operator.

    In addition, operators may deploy a .NET loader to run PowerShell scripts in memory, allowing deeper control and customization within the environment.

    Skitnet’s .NET loader
    Source: Prodaft

    Adoption Driven by Accessibility and Anonymity

    While top-tier ransomware groups often rely on custom-built post-exploitation tools, these require skilled developers and substantial investment. By contrast, Skitnet offers a ready-to-use and cost-effective solution that’s quick to deploy and harder to attribute, as it is shared across multiple threat actors.

    “Skitnet’s capabilities make it especially attractive for groups looking to maximize impact with minimal overhead,” said Prodaft, which has published related Indicators of Compromise (IoCs) on GitHub.

    Despite increasing AV evasion capabilities in custom tools, the combination of affordability, modularity, and stealth is driving broader use of off-the-shelf malware like Skitnet among ransomware operators.

    Related Posts