Browsing tag

RAT

Cross-platform Remote Access Trojan “Adwind” Steal Credentials, Record and Harvest keystrokes the Aerospace Industries Data

Remote Access Trojan(RAT) Called “Adwind”(Adwind/jRAT)  Targeting Aerospace Industries to steal credentials, record and harvest keystrokes, take pictures or screenshots, film and retrieve videos, and exfiltrate data. Its a Cross Platform Remote Access Trojan which Detect as JAVA_ADWIND and Malware Authors developed this Malware to run on any machine installed with Java, including Windows, Mac OSX, […]

Android Remote Access Trojan (RAT) Controlled Via Telegram Protocol and Steal users Confidential Data

A Remote Access Trojan (RAT) for Android called “Android.Spy.377.origin” with Spying Capability Malware used to steal the Android Users Confidential information via Telegram Protocol. Hackers execute this Spyware Via commands and its used message-exchange protocol of the Telegram online messenger. This Spyware checking the Popularity of the infected user among all other Telegram users and […]

Hackers Using Unmonitored System Tools, Protocols for Malicious Goals

The IT security researchers at Cisco’s security intelligence and research group Talos have discovered a malware that can fully hide its origins. The sample that the researchers analyzed was utilizing DNS TXT record queries/response for creating a “bidirectional Command and Control channel.” The findings of their research have been published in a report compiled by Edmund Brumaghin and […]

Commercial Remote Access Trojan (RAT) Remcos Spotted in Live Attacks

A remote access Trojan (RAT) is a malware program that incorporates a back door for administrative control over the objective PC. RATs are normally downloaded invisibly with a client trusted program like games, Email attachments. Remcos RAT was first sold in hacking forums in late 2016 and from that point it get’s updated with more […]

Kaspersky discovered a One-stop-shop for hacking goods

Security experts from Kaspersky Lab discovered an interesting one-stop-shop for purchasing hacking goods while investigating activity of a popular RAT. Security experts from Kaspersky Lab discovered an interesting one-stop-shop for purchasing hacking goods. The malware researchers were analyzing traffic from a number of infected machines that appear to be generated by the HawkEye RAT.   HawkEye […]

Teaching an old RAT new tricks

Attackers have been successfully deploying RATs for years to remotely control users systems – giving them full access to the victim’s files or resources such as cameras, recording key strokes, or downloading further malware.  Traditionally RATs have been deployed when a user opens an email attachment, or downloads a file from a website or peer-to-peer […]

Asian Nation-State hackers use fileless RAT for their hacking campaign

State-sponsored actors in Asia have been leveraging fileless RAT for their hacking campaigns in order to avoid the detection. Security experts from SentinelOne spotted nation-state actors in Asia running espionage campaigns relying on fileless Remote Access Trojan. The state-sponsored hackers were injecting the RAT payload directly into the memory of the target host in order to […]

European Police Agencies declare war on DroidJack RAT

Authorities in several European countries announced they have coordinated an operation to arrest criminals using the popular DroidJack RAT. Android RATs are becoming very popular in the criminal underground, a recent research conducted by Recorded Future demonstrated that interest in the DroidJack and AndroRAT, especially in the Middle East and Africa. Mobile spyware is widely adopted […]

AutoIt Used in Targeted Attacks to Move RATs

Hackers, months ago, revived macros as an attack vector to primarily hide banking malware spread by spam campaigns. Not be left out, some targeted attacks kicked off by convincing phishing emails, have been moving a few remote access Trojans and other malware via Word docs. One particular targeted campaign, researchers at Cisco said, was using […]

Time To Cover Webcams: Wannabe Hackers Invading Your Privacy Using RAT

Digital hacking and learning about hacking has now become easier than you ever imagined, investigation report by the Digital Citizens Alliance reveals — Remote Access Trojan (RAT) Openly Available, Privacy Invasions at its Peak. We all are aware of the fact that people have an open access to the Internet, and anyone can find any piece […]

Backtracing a RAT / Find the IP of the Hacker’s RAT

Welcome to my tutorial, today i will be showing you how to get someone’s ip once you have the person’s RAT. In other words, i’m going to show you how easy it is for the feds to get your ip and get you arrested if they wanted to. Requirements: Wireshark [DOWNLOAD] Sandboxie [DOWNLOAD] First open […]