Articles tagged "Trojan"

Found 21 articles

Actively Exploited

The latest Security Affairs Malware newsletter covers several significant malware threats that have emerged recently. Notably, a group identified as Stan Ghouls is targeting users in Russia and Uzbekistan using the NetSupport Remote Access Trojan (RAT), which allows attackers to control infected systems remotely. Another concerning development is the discovery of ZeroDayRAT, a new spyware designed to infiltrate both Android and iOS devices. Additionally, researchers have uncovered a Linux botnet named SSHStalker, which utilizes old-school IRC methods to compromise new victims. These activities demonstrate the evolving tactics of cybercriminals and emphasize the need for users and organizations to remain vigilant against these persistent threats.

Impact: NetSupport RAT, ZeroDayRAT (Android and iOS), SSHStalker Linux Botnet
Remediation: Users should implement security updates, monitor network activity for unusual behavior, and utilize endpoint protection solutions to mitigate these threats.
Read Original

A new cyber campaign known as Bloody Wolf is actively targeting individuals in Uzbekistan and Russia using the NetSupport Remote Access Trojan (RAT). Researchers report that around 50 victims have been affected in Uzbekistan and about 10 in Russia, with smaller numbers in Kazakhstan, Turkey, Serbia, and Belarus. This type of malware allows attackers to gain control over infected systems, posing significant risks to personal and sensitive information. The targeting of these specific regions suggests a focused effort by the attackers, likely indicating political or economic motivations behind the campaign. Users in these countries should be vigilant about suspicious emails and software installations to protect against such threats.

Impact: NetSupport Remote Access Trojan (RAT) affecting users in Uzbekistan, Russia, Kazakhstan, Turkey, Serbia, and Belarus.
Remediation: Users should avoid downloading suspicious attachments, ensure their antivirus software is up to date, and monitor their systems for unusual activity.
Read Original

A fraudulent 7-Zip website has emerged, distributing a compromised version of the popular file archiving software. This malicious installer includes a trojan that converts the user's computer into a residential proxy node, which can be used by attackers for various illicit activities. Users who unknowingly download this installer are putting their machines at risk and could potentially face privacy violations or further exploitation. This situation is particularly concerning as it exploits the trust many people have in widely used software like 7-Zip. It's crucial for users to ensure they download software only from official sources to avoid similar threats.

Impact: 7-Zip software, user computers
Remediation: Users should only download software from the official 7-Zip website and verify the source of installers before executing them.
Read Original

A cybercriminal group known as Bloody Wolf is targeting organizations in Uzbekistan and Russia with a spear-phishing campaign designed to deploy a remote access trojan called NetSupport RAT. This group, which has been active since at least 2023, is focusing its attacks on the manufacturing, finance, and IT sectors. Kaspersky, a cybersecurity firm, is tracking this activity under the name Stan Ghouls. The use of spear-phishing indicates that the attackers are likely customizing their messages to trick specific individuals or organizations into downloading the malicious software. This type of threat can lead to significant data breaches and operational disruptions for the affected companies, making it crucial for them to enhance their email security and user awareness training.

Impact: NetSupport RAT, manufacturing, finance, IT sectors
Remediation: Enhance email security, implement user awareness training, and monitor for unusual system activity.
Read Original

Researchers have identified a supply chain attack affecting legitimate npm and PyPI packages, specifically targeting versions of @dydxprotocol/v4-client-js. The compromised versions include 3.4.1, 1.22.1, 1.15.2, and 1.0.31. Attackers have modified these packages to distribute malware designed to steal cryptocurrency wallet credentials and enable remote access through RAT (Remote Access Trojan) software. This incident poses a significant risk to developers and users relying on these packages, as it can lead to unauthorized access to sensitive financial information. Companies and individual developers should review their dependencies and ensure they are using safe versions to mitigate potential risks.

Impact: @dydxprotocol/v4-client-js (npm) versions 3.4.1, 1.22.1, 1.15.2, 1.0.31
Remediation: Developers should update to safe versions of @dydxprotocol/v4-client-js and review their package dependencies for any signs of compromise.
Read Original
Actively Exploited

Bitdefender has identified a new Android malware campaign that uses Hugging Face, a platform typically associated with artificial intelligence and machine learning. This malware, classified as a Remote Access Trojan (RAT), is designed to gain unauthorized access to Android devices, potentially compromising user data and privacy. The campaign raises concerns as it exploits a legitimate platform to distribute malicious software, making it harder for users to detect the threat. Users of Android devices should be particularly cautious and ensure they download apps only from trusted sources to avoid falling victim to this malware. The implications are significant, especially for those who may unknowingly install infected applications, leading to data theft or device control by attackers.

Impact: Android devices, Hugging Face platform
Remediation: Users should only download apps from official app stores and be cautious about granting permissions to applications.
Read Original
Actively Exploited

Researchers have discovered that malicious Python packages were uploaded to the Python Package Index (PyPI), posing a significant risk to developers. The harmful code was hidden within a file that appeared to be a Basque language dictionary but was actually a compressed archive containing a Remote Access Trojan (RAT). This incident could affect any developers who inadvertently install these malicious packages, potentially allowing attackers to gain unauthorized access to their systems. It serves as a reminder for users to be cautious when downloading packages from open-source repositories, as they can be exploited to distribute malware. Vigilance and thorough vetting of software dependencies are crucial for maintaining security.

Impact: Python Package Index (PyPI), developers using malicious packages
Remediation: Developers should avoid installing unverified packages and consider using tools to scan for malicious code in dependencies.
Read Original

Researchers have identified a new variant of PureRAT, a remote access trojan (RAT), which now includes emojis in its code. The presence of these emojis suggests that the malware may have been generated using AI, pulling comments and content from social media. This finding raises concerns about the evolving tactics of cybercriminals, as they increasingly use advanced technology to craft their malware. Users and organizations should be vigilant, as this type of malware can compromise sensitive information and control systems remotely. The shift to AI-generated malware indicates a potential increase in the sophistication and adaptability of cyber threats.

Impact: PureRAT malware, remote access tools, social media platforms
Remediation: Users should ensure their antivirus software is up to date and consider employing additional network security measures to detect and block unauthorized access.
Read Original

India is currently dealing with a sophisticated espionage campaign that utilizes the Blackmoon trojan. This attack begins with a ZIP file that conceals malicious files, allowing attackers to infiltrate systems. The campaign poses a significant risk to sensitive information and national security, as it targets various sectors within the country. Cybersecurity experts are urging organizations in India to remain vigilant and enhance their security measures to protect against such advanced threats. This incident underscores the ongoing risks of cyber espionage and the need for robust defense strategies.

Impact: Blackmoon trojan, ZIP file attachments, various sectors in India
Remediation: Organizations should enhance their security measures, including regular updates and employee training on recognizing suspicious files and emails.
Read Original

A new cybersecurity threat involves a malicious browser extension called NexShield, which uses social engineering tactics to crash users' browsers. This attack is designed to deliver a Python-based Remote Access Trojan (RAT), putting users' systems at risk of further compromise. The method relies on tricking users into installing the extension, which then takes control of their browsers. As a result, individuals and organizations that fall victim could face significant data theft or system damage. Users are advised to be cautious about browser extensions and ensure they are from trusted sources to avoid falling prey to such scams.

Impact: Web browsers affected by the NexShield extension, potentially impacting all major browser platforms.
Remediation: Users should avoid installing browser extensions from untrusted sources and regularly update their browsers to the latest versions. Running antivirus software to detect and remove malicious software is also recommended.
Read Original

Cybersecurity researchers at Securonix have reported a new campaign targeting the European hospitality sector, known as PHALT#BLYX. This campaign uses fake booking emails to trick hotel staff into clicking on links that lead to counterfeit blue screen of death (BSoD) error pages. By doing so, attackers aim to install a remote access trojan called DCRat on the victims' systems. This type of malware allows hackers to gain unauthorized access to sensitive information and control over the infected devices. The incident underscores the need for heightened vigilance among hotel employees regarding suspicious emails and links, as these tactics can lead to severe security breaches.

Impact: European hospitality sector, hotel staff, systems infected with DCRat
Remediation: Employees should be trained to recognize phishing attempts and avoid clicking on suspicious links. Implementing email filtering and security software can help block malicious emails.
Read Original

The cybercriminal group known as Silver Fox has recently shifted its focus to Indian users, employing income tax-themed phishing emails to spread a remote access trojan called ValleyRAT. This malware is designed to give attackers remote control over infected systems. Researchers from CloudSEK, Prajwal Awasthi and Koushik Pal, noted that the attack utilizes a sophisticated method involving DLL hijacking to ensure the malware remains persistent on the target devices. Users in India should be particularly cautious of emails related to taxes, as they are being used as bait to deliver this malicious software. The rise in such targeted phishing campaigns emphasizes the need for increased awareness and cybersecurity measures among individuals and organizations.

Impact: ValleyRAT malware, phishing emails targeting Indian users
Remediation: Users should be wary of suspicious emails, especially those related to income tax, and ensure their antivirus software is up to date. It's advisable to employ email filtering solutions and conduct regular security awareness training.
Read Original
Hackers Abuse Popular Monitoring Tool Nezha as a Stealth Trojan

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

A recent report from cybersecurity firm Ontinue reveals that the open-source monitoring tool Nezha is being misused as a Remote Access Trojan (RAT) by hackers. This abuse allows attackers to bypass security measures and gain control over servers worldwide. The exploitation of Nezha raises significant concerns for organizations using the tool, as it can lead to unauthorized access and potential data breaches. Users of the tool should be particularly vigilant, as this incident demonstrates how legitimate software can be weaponized for malicious purposes. The situation underscores the need for enhanced security protocols and monitoring to protect against such threats.

Impact: Nezha monitoring tool, servers globally
Remediation: Organizations using Nezha should review their security settings, monitor for unusual activity, and consider implementing additional security measures to mitigate risks associated with this RAT exploitation.
Read Original

A recent campaign has targeted developers through the Visual Studio Code (VSCode) Marketplace, where 19 malicious extensions have been found since February. These extensions cleverly disguise malware within dependency folders, hiding it in fake PNG files. Developers using these compromised extensions are at risk, as the malware can potentially compromise their systems and projects. This incident raises alarms about the safety of third-party tools within development environments. Users are urged to be cautious when installing extensions and to verify their sources to avoid falling victim to such attacks.

Impact: VSCode Marketplace extensions, developers using these extensions
Remediation: Users should uninstall any suspicious extensions and verify the sources of the extensions they use. Regularly update VSCode and its extensions to the latest versions.
Read Original

North Korea-linked cyber actors are exploiting a recently identified vulnerability in React Server Components known as React2Shell to deploy a new remote access trojan called EtherRAT. This malware utilizes Ethereum smart contracts to manage command-and-control communications and can establish multiple persistence mechanisms on Linux systems. The emergence of EtherRAT marks a concerning development as it allows attackers to maintain access to compromised systems. Companies using React Server Components need to be vigilant and update their systems to mitigate this risk. The situation emphasizes the ongoing threat posed by state-sponsored hacking groups and the importance of timely patching of known vulnerabilities.

Impact: React Server Components (RSC), Linux systems
Remediation: Update systems to patch the React2Shell vulnerability; specific patch details not provided.
Read Original
Page 1 of 2Next