#remote-access-trojan

[ follow ]
Information security
fromZDNET
1 day ago

Watch out for this fake Windows BSOD - it's actually malware

Cybercriminals use fake BSODs, ClickFix social engineering, and fake CAPTCHAs to trick hospitality workers into running a Russian-linked RAT that enables remote PC takeover.
#phishing
Information security
fromThe Hacker News
3 weeks ago

React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors

React2Shell is exploited to deploy stealthy remote-access malware such as KSwapDoor and ZnDoor, enabling encrypted mesh communications, command execution, and file operations.
fromThe Hacker News
3 weeks ago

Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads

Cybersecurity researchers are calling attention to a new campaign that's leveraging GitHub-hosted Python repositories to distribute a previously undocumented JavaScript-based Remote Access Trojan (RAT) dubbed PyStoreRAT. "These repositories, often themed as development utilities or OSINT tools, contain only a few lines of code responsible for silently downloading a remote HTA file and executing it via 'mshta.exe,'" Morphisec researcher Yonatan Edri said in a report shared with The Hacker News.
Information security
Information security
fromThe Hacker News
2 months ago

Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files

A coordinated spear-phishing campaign named PhantomCaptcha used fake Zoom and Cloudflare CAPTCHA pages to deliver a WebSocket-based remote access trojan to Ukraine-related organizations.
Information security
fromSecurityWeek
3 months ago

Threat Actor Infests Hotels With New RAT

RevengeHotels targets hotels to steal guest credit card data via phishing-delivered RATs, adding AI-generated loaders and VenomRAT to achieve persistent access.
fromThe Hacker News
4 months ago

TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations

Available in both Python and C variants, CastleRAT's core functionality consists of collecting system information, downloading and executing additional payloads, and executing commands via CMD and PowerShell," Recorded Future Insikt Group said.
Information security
#cybersecurity
Node JS
fromIT Pro
6 months ago

Developers beware: Malware has been found in a dozen popular NPM packages - here's what you need to know

Over a dozen NPM packages have been compromised, delivering malware that allows attackers to control infected machines.
Node JS
fromBleepingComputer
7 months ago

Interlock ransomware gang deploys new NodeSnake RAT on universities

Interlock gang deploys NodeSnake RAT against educational institutions, showcasing evolving malware threats.
[ Load more ]