Elastic Security Labs has sounded the alarm after uncovering multiple active infostealer campaigns leveraging the commercial AV/EDR evasion framework SHELTER for malicious purposes.
Once marketed exclusively to offensive security professionals for red team simulation, SHELTER is now being abused by threat actors to bypass modern security tools and deploy a potent array of malware in the wild.
SHELTER, developed by the Shelter Project, was initially designed to help red teams stealthily deploy payloads for sanctioned security assessments.
Its commercial versions, Shellter Pro Plus and Shellter Elite boast advanced anti-detection capabilities.
However, Elastic Security Labs has traced a surge in infostealer campaigns packaging their payloads with Shellter Elite 11.0 since April 2025, following its recent release.
Despite the vendor’s safeguards, such as geographic sales restrictions and rigorous due diligence, at least one copy of Shelter Elite has fallen into the hands of criminals.
The tool’s advanced evasion tactics have made it a favorite for financially motivated cybercriminals, as evidenced by low detection rates on VirusTotal for SHELLTER-protected payloads and active resale offers on illicit forums.
SHELTER-protected malware demonstrates several sophisticated anti-analysis and anti-detection mechanisms:
ntdll.dll) directly into memory, evading hooks set by security products.Elastic researchers have also noted license checks and unique expiry “kill switches” embedded in illicit samples hinting a single stolen elite license is behind most recent attacks.
Among the most prominent threats are LUMMA, RHADAMANTHYS, and ARECHCLIENT2 infostealers, all of which are observed using Shellter-protected launchers.
Notably, distribution channels include phishing lures, booby-trapped YouTube links, and file-sharing sites like MediaFire.
To support defenders, Elastic Security Labs has released a dynamic unpacker for SHELLTER-protected binaries, along with accompanying YARA rules, urging organizations to update their detection mechanisms.
The firm warns that as threat actors further integrate advanced red team tools, defenders must anticipate rapid evolution in evasion techniques.
The leakage of commercial offensive security tools, such as SHELLTER, into the hands of criminals marks a dangerous escalation in malware sophistication, forcing the cybersecurity community to focus on rapid detection, analysis, and mitigation of these advanced threats.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…