Daily NewsThreat Detection & Defense

Sakura RAT: Cybercriminals Sabotaged by Their Own Malware Campaign, Sophos Finds

How a Simple Query Led to a Wave of Curious Findings

Ever heard of the “Sakura RAT”? Well, you will now.

Cybercriminals have been lacing their own malware and gaming cheats with backdoors. This was the overarching finding of a Sophos study in response to what initially seemed like a routine support request. What was a simple query instead shed light on a cunning and large-scale campaign tied to the alias “ischhfd83.”

According to Sophos, Sophos X‑Ops researchers started investigating after a customer inquiry about “Sakura RAT,” which was initially advertised as a sophisticated malware on GitHub. Sophos’s initial finding was that the Sakura RAT itself was ineffective. However, a deeper analysis ultimately revealed hidden infostealers and backdoors aimed at users who compiled the code—suggesting a deliberate trap.

Sakura RAT and the Web of Backdoored Repositories

Pursuing the trail, Sophos found 141 backdoored GitHub projects linked by the email ischhfd83@rambler.ru. Among them were 133 contained backdoor code and 111 injected during PreBuild in VB projects. Python, JavaScript, and screensavers were also used, according to Sophos. In addition, most repositories were gaming cheats (58%), followed by malware tools (24%), bots (7%), crypto utilities (5%), and miscellaneous tools (6%). The earliest backdoor appeared in November 2023.

One backdoor variant, in particular, slipped malicious batch commands into the Visual Basic PreBuild script. This script generated a VBS file, which decoded PowerShell code. The PowerShell, in turn, fetched a password-protected 7z archive from hardcoded URLs, installed 7-Zip if needed, extracted the payload, and executed a file named SearchFilter.exe. This multi-stage obfuscation suggests careful design to evade detection.

Possible Criminal Infrastructure of the Sakura RAT

So far, the evidence links the campaign to a malware Distribution‑as‑a‑Service (DaaS) operation, which potentially could be Stargazer Goblin—or a rival. While conducting the investigation, Sophos alerted GitHub and removal has since taken place, with the malicious 7z-hosting repo, most backdoored projects, and harmful paste‑site entries already taken down. However, some repositories vanished before analysis finished, and new backdoors continue to surface. This, according to Sophos, is indicative of an active, evolving operation.

Although these backdoors primarily target gamers and amateur cybercriminals, the potential collateral impact is wide-reaching. Security researchers and curious users who download and test code from public repos could inadvertently trigger malware execution. In response, Sophos is recommending the following:

  • Be extremely cautious with unverified code—inspect for obfuscation or hidden build steps.
  • Always use isolated environments (sandbox, VM) for testing.
  • Scan unknown files with reputable tools (e.g., VirusTotal).
    These measures are crucial whether you’re a hacker, a gamer, or a developer. sophos.com

Indeed, a seemingly simple customer support question exposed a sprawling, deliberate campaign of self-sabotaging cybercrime. This latest incident underscores one critical lesson in this modern security landscape: When it comes to cybersecurity, trust nothing and always verify everything.

Martin Dale Bolima

Martin has been a Technology Journalist at Asia Online Publishing Group (AOPG) since July 2021, tasked primarily to handle the company’s Disruptive Tech Asia and Disruptive Tech News online portals. He also contributes to Cybersecurity ASEAN and Data&Storage ASEAN, with his main areas of interest being artificial intelligence and machine learning, cloud computing and cybersecurity. A seasoned writer and editor, Martin holds a degree in Journalism from the University of Santo Tomas in the Philippines. He began his professional career back in 2006 as a writer-editor for the University Press of First Asia, one of the premier academic publishers in the Philippines. He next dabbled in digital marketing as an SEO writer while also freelancing as a sports and features writer.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *