Search results: remote access trojan

New Phishing Campaign Delivers Remote Access Trojans (RATs)

Sophisticated phishing campaign leverages public services, where remote access Trojans are being delivered via malicious Java downloader A new phishing campaign has surfaced this week which cleverly employs a Java-based downloader to ...
Godbex Platform

Who’s Behind the NetWire Remote Access Trojan?

A Croatian national has been arrested for allegedly operating NetWire, a Remote Access Trojan (RAT) marketed on cybercrime forums since 2012 as a stealthy way to spy on infected systems and siphon ...
SafeBreach Labs Researchers Uncover New Remote Access Trojan (RAT)

SafeBreach Labs Researchers Uncover New Remote Access Trojan (RAT)

|
Dubbed CodeRAT, the new RAT is used in attacks targeting Farsi-speaking code developers using a Microsoft Dynamic Data Exchange (DDE) exploit. The post SafeBreach Labs Researchers Uncover New Remote Access Trojan (RAT) ...

Technical Analysis of PureCrypter: A Fully-Functional Loader Distributing Remote Access Trojans and Information Stealers

|
Key points PureCrypter is a fully-featured loader being sold since at least March 2021 The malware has been observed distributing a variety of remote access trojans and information stealers The loader is ...

Malware spotlight: What is a Remote Access Trojan (RAT)?

| | Malware Analysis
Introduction A Remote Access Trojan (RAT) is a type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim’s... Go on to ...

Top 5 Remote Access Trojans

Introduction to RATs Once a hacker has gained initial access to a target machine, expanding and solidifying that foothold is the next logical step. In the case of a phishing attack, this ...
A software supply chain meltdown: What we know about the XZ Trojan

A software supply chain meltdown: What we know about the XZ Trojan

Security experts are sounding alarms about what some are calling the most sophisticated supply chain attack ever carried out on an open source project: a malicious backdoor planted in xz/liblzma (part of ...
Microsoft Storm-1152 fake accounts CaaS

Russian Hackers Access Source Code in Ongoing Attack on Microsoft

The Russian state-sponsored bad actors who hacked into the corporate email accounts of executives at Microsoft are taking another run at the IT giant, this time using information stolen then to access ...
Security Boulevard
The Week in Security: Malware gives remote access to air-gapped devices, cyber attackers target Italy

The Week in Security: Malware gives remote access to air-gapped devices, cyber attackers target Italy

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, ...

The TOITOIN Trojan: Analyzing a New Multi-Stage Attack Targeting LATAM Region

|
Summary Discover the intricate layers of a new sophisticated and persistent malware campaign targeting businesses in the LATAM region delivering the TOITOIN Trojan. Delve into the multi-stage attack methodology, from deceptive phishing ...