Connect with us
DAPA Banner

Crypto World

Kaspersky flags RenEngine loader spread via pirated software

Published

on

Crypto Breaking News

Editor’s note: In the ongoing battle against malware, RenEngine’s reach underscores how attackers exploit trusted software channels to broaden their victim base. Today’s briefing from Kaspersky Threat Research highlights a multi-stage infection that pivots beyond gaming into widely used cracked productivity tools. The findings emphasize the importance of verifying software sources and maintaining updated defenses across personal and corporate environments. As cyber threats increasingly blend with legitimate workflows, readers should review security practices, stay vigilant about unofficial installers, and consider how threat actors opportunistically adapt to new distribution methods. This update offers context for executives, IT teams, and security professionals navigating a rapidly evolving threat landscape.

Key points

  • RenEngine loader is distributed via dozens of pirated software sites, not just cracked games.
  • Final payloads include Lumma, ACR Stealer, and Vidar in various infection chains.
  • The distribution pattern is opportunistic and regional rather than targeted.
  • The campaign uses Ren’Py-based game installers with fake loading screens to deploy malware

Why this matters

The expansion from gaming to cracked productivity software widens the potential victim pool and raises risk for individuals and organizations. Attackers use multi-stage delivery, anti-analysis checks, and broad distribution to bypass defenses. Organizations should reinforce software provenance checks, user education, and behavior-based detection to identify malicious activity masquerading as legitimate software.

What to watch next

  • Watch for new distribution sites or bundles carrying RenEngine via cracked software.
  • Monitor for updates from security vendors on HijackLoader-based campaigns across multiple payloads.
  • Track any new payload families linked to RenEngine or related loaders.

Disclosure: The content below is a press release provided by the company/PR representative. It is published for informational purposes.

Kaspersky identifies RenEngine loader distributed through pirated games and software

Kaspersky identifies RenEngine loader distributed through pirated games and software

February 23, 2026

Kaspersky Threat Research has revealed its analysis of RenEngine, a malware loader that has recently gained public attention. Kaspersky identified RenEngine samples as early as March 2025, with its solutions already protecting users from the threat at that time.

Advertisement

Beyond the cracked games highlighted in recent reports, Kaspersky researchers discovered that attackers created dozens of websites distributing RenEngine through pirated software, including graphics editors like CorelDRAW. This expands the known attack surface beyond the gaming community to anyone seeking unlicensed software.

Kaspersky has recorded incidents in Russia, Brazil, Turkey, Spain and Germany, among other countries. The distribution pattern indicates opportunistic attacks rather than targeted operations.

When Kaspersky first identified RenEngine, the loader was delivering the Lumma stealer. Current attacks distribute ACR Stealer as the final payload, and Vidar stealer has also been observed in some infection chains.

The campaign exploits modified versions of games built on the Ren’Py visual novel engine. When users launch infected installers, a fake loading screen appears while malicious scripts execute in the background. The scripts include sandbox detection capabilities and decrypt a payload that initiates a multi-stage infection chain using HijackLoader, a modular malware delivery tool.

Advertisement

“This threat extends beyond pirated games — attackers are using the same technique to distribute malware through cracked productivity software, which broadens the potential victim pool significantly.”

— Pavel Sinenko, lead malware analyst at Kaspersky Threat Research

“Game archive formats vary by engine and title. If an engine doesn’t check the integrity of its resources, attackers can embed malware that executes the moment you click play.”

Kaspersky solutions detect RenEngine as Trojan.Python.Agent.nb and HEUR:Trojan.Python.Agent.gen. HijackLoader is detected as Trojan.Win32.Penguish and Trojan.Win32.DllHijacker.

To stay protected, Kaspersky recommends:

Advertisement
  • Download games and software only from official sources. Pirated content remains one of the most common malware delivery methods.
  • Use a reliable security solution. Kaspersky Premium protects against threats like RenEngine through its Behavior Detection component, which identifies malicious activity even when malware is disguised as legitimate software.
  • Keep your operating system and applications updated to ensure known vulnerabilities are patched.
  • Be skeptical of “free” offers. If a paid game or software is available for free download on an unofficial site, the cost is likely your security.

About Kaspersky

Kaspersky is a global cybersecurity and digital privacy company founded in 1997. With over a billion devices protected to date from emerging cyberthreats and targeted attacks, Kaspersky’s deep threat intelligence and security expertise is constantly transforming into innovative solutions and services to protect individuals, businesses, critical infrastructure, and governments around the globe. The company’s comprehensive security portfolio includes leading digital life protection for personal devices, specialized security products and services for companies, as well as Cyber Immune solutions to fight sophisticated and evolving digital threats. We help millions of individuals and nearly 200,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com.

Risk & affiliate notice: Crypto assets are volatile and capital is at risk. This article may contain affiliate links. Read full disclosure

Source link

Advertisement
Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

Bittensor (TAO) Crypto Surges 46% as Covenant-72B Launch Triggers Subnet Explosion

Published

on

tao logo

Bittensor (TAO) crypto just surged 46% in March. Trading near $277.

The network successfully deployed its Covenant-72B model on Subnet 3. That is not a roadmap promise. It is a live heavy-compute model running on-chain.

The market responded immediately. The subnet-native τemplar token pumped nearly 200% in under a week.

TAO is no longer just a governance play. Actual utility demand is driving this move.

Advertisement

Key Takeaways:

  • TAO posts 46% monthly gain driven by Covenant-72B model deployment.
  • Subnet 3 activity explodes, pushing the τemplar token up 194% in days.
  • Institutional inflow accelerates ahead of potential Grayscale ETF approval.

Covenant-72B: Why This Release Moved the Market

Covenant-72B is a 72 billion parameter large language model. A significant jump from the lighter models Bittensor has run previously. It means the network can now handle enterprise-grade compute loads.

That scale directly impacts validator staking. Running a model this size requires higher quality miner inputs and more TAO staked to secure the bandwidth. Demand for compute on Subnet 3 created direct demand for the collateral backing it. The pricing mechanism worked exactly as designed.

The biggest winner was not TAO itself. It was τemplar, the Subnet 3 native token, which rallied 194% following the deployment. That is the ecosystem feedback loop in action. High-performance subnets attract speculative capital, which deepens liquidity for the miners running there.

Volume backs the move. TAO’s volume-to-market-cap ratio is sitting between 17% and 19%, with over $254 million traded in 24 hours. That is not a thin order book pump. That is real participation.

When subnet tokens outperform the parent chain like this, it typically signals the start of an application layer season for the protocol. That is the next phase traders are positioning for.

TAO Crypto Price Analysis: Can Bulls Breach $300?

Advertisement

TAO is consolidating at $277.49, just below the $300 psychological level. Structure stays bullish as long as $250 holds.

The 46% impulse already flushed weak hands. OI is building. Traders are positioning for a breakout.

Bittensor (TAO)
24h7d30d1yAll time

Bull case: daily close above $300 opens $350. Grayscale ETF filing provides the fundamental narrative. Volume needs to stay above $250 million daily to keep the momentum alive.

Bear case: rejection at $300 retests $240. If the broader altcoin recovery stalls, TAO could chop sideways for weeks. Watch $265 closely. Lose that level and the immediate breakout setup is invalidated.

Advertisement

The post Bittensor (TAO) Crypto Surges 46% as Covenant-72B Launch Triggers Subnet Explosion appeared first on Cryptonews.

Source link

Advertisement
Continue Reading

Crypto World

Bitcoin ETFs on Track to Turn Positive YTD as XRP Rebounds

Published

on

Bitcoin ETFs on Track to Turn Positive YTD as XRP Rebounds

US spot Bitcoin exchange-traded funds (ETFs) extended their inflow streak to seven consecutive days, marking the longest run since October 2025.

Spot Bitcoin (BTC) ETFs added $199.4 million on Monday, bringing their seven-day streak to around $1.2 billion, according to data from SoSoValue. The latest inflows suggest continued institutional interest, though total inflows remain far below the roughly $6 billion seen during the October 2025 run.

Total trading volumes fell to $2.6 billion on Monday, while total assets under management in Bitcoin ETFs climbed to $96.7 billion. Net year-to-date flows remain negative, following $1.8 billion in cumulative monthly outflows and $1.7 billion in cumulative inflows.

The ETF rebound has coincided with broader strength in crypto investment products, which drew about $2.7 billion over three straight weeks, lifting year-to-date inflows to roughly $1.2 billion, according to CoinShares.

Advertisement
Daily spot Bitcoin ETF inflows from March 9–March 17, 2026, versus Sept. 29–Oct. 9, 2025. Source: SoSoValue

XRP funds post first gains after eight-day losing streak

Spot altcoin ETFs also saw a broad uptick, led by Ether (ETH) with $138.3 million in inflows, the largest since March 4. Solana (SOL) followed the trend with $17.8 million in inflows, also the biggest since March 4.

XRP (XRP) stood out with $4.64 million inflows, the first gains since March 4. The ETFs saw $56.8 million outflows in the period from March 5-16.

Daily XRP ETF flows from March 4–March 17, 2026. Source: SoSoValue

Despite $33.5 million in outflows so far in March, XRP ETFs remain in the green year-to-date, supported by $73.7 million in inflows during January and February.

Solana leads all crypto ETFs year-to-date with $223 million in net inflows.

Related: Bernstein says Bitcoin rebound reflects more resilient long-term holder base

In contrast, Ether ETFs remain underwater, with $364.5 million in year-to-date outflows, following $358.5 million in inflows in March and $723 million in outflows during the first two months of the year.

Advertisement

Magazine: Spot Bitcoin ETFs first green week, crypto ATM losses surge 33%: Hodler’s Digest, Mar. 8 – 14