#remote-access-trojans

[ follow ]
fromTechRepublic
1 week ago

Windows Users: Global UpCrypter Phishing Attack is Expanding

The phishing emails arrive disguised as missed voicemails or purchase orders. Victims who click on the attachments are redirected to fake websites, designed to appear convincing, often featuring company logos to increase trust. According to Fortinet, these phishing pages prompt users to download a ZIP file containing a heavily disguised JavaScript dropper. Once opened, the script triggers PowerShell commands in the background that connect to attacker-controlled servers for the next stage of malware.
Information security
Information security
fromThe Hacker News
1 week ago

Blind Eagle's Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra

Blind Eagle conducted espionage and financially motivated intrusions targeting Colombian government and regional organizations using RATs, spear-phishing, legitimate services, and geofencing.
#cybersecurity
fromThe Hacker News
2 months ago
Privacy technologies

Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks

Blind Eagle uses Proton66 for hosting to launch malware attacks via Visual Basic Script (VBS) and off-the-shelf remote access trojans.
fromTheregister
4 months ago
London startup

Chinese spies backdoored US orgs via open source RAT

A Chinese cyberspy group is using an advanced malware that offers remote access and increased stealth for espionage purposes.
London startup
fromTheregister
4 months ago

Chinese spies backdoored US orgs via open source RAT

A Chinese cyberspy group is using an advanced malware that offers remote access and increased stealth for espionage purposes.
[ Load more ]