#remote-access-trojan

[ follow ]
Information security
fromThe Hacker News
1 week ago

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Attackers compromised dYdX client packages on npm and PyPI to distribute malicious releases that steal wallet credentials and install a remote access trojan.
#android-malware
Information security
fromZDNET
1 month ago

Watch out for this fake Windows BSOD - it's actually malware

Cybercriminals use fake BSODs, ClickFix social engineering, and fake CAPTCHAs to trick hospitality workers into running a Russian-linked RAT that enables remote PC takeover.
#phishing
Information security
fromThe Hacker News
2 months ago

React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors

React2Shell is exploited to deploy stealthy remote-access malware such as KSwapDoor and ZnDoor, enabling encrypted mesh communications, command execution, and file operations.
fromThe Hacker News
2 months ago

Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads

Cybersecurity researchers are calling attention to a new campaign that's leveraging GitHub-hosted Python repositories to distribute a previously undocumented JavaScript-based Remote Access Trojan (RAT) dubbed PyStoreRAT. "These repositories, often themed as development utilities or OSINT tools, contain only a few lines of code responsible for silently downloading a remote HTA file and executing it via 'mshta.exe,'" Morphisec researcher Yonatan Edri said in a report shared with The Hacker News.
Information security
Information security
fromThe Hacker News
3 months ago

Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files

A coordinated spear-phishing campaign named PhantomCaptcha used fake Zoom and Cloudflare CAPTCHA pages to deliver a WebSocket-based remote access trojan to Ukraine-related organizations.
Information security
fromSecurityWeek
4 months ago

Threat Actor Infests Hotels With New RAT

RevengeHotels targets hotels to steal guest credit card data via phishing-delivered RATs, adding AI-generated loaders and VenomRAT to achieve persistent access.
fromThe Hacker News
5 months ago

TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations

Available in both Python and C variants, CastleRAT's core functionality consists of collecting system information, downloading and executing additional payloads, and executing commands via CMD and PowerShell," Recorded Future Insikt Group said.
Information security
#cybersecurity
Node JS
fromIT Pro
8 months ago

Developers beware: Malware has been found in a dozen popular NPM packages - here's what you need to know

Over a dozen NPM packages have been compromised, delivering malware that allows attackers to control infected machines.
Node JS
fromBleepingComputer
8 months ago

Interlock ransomware gang deploys new NodeSnake RAT on universities

Interlock gang deploys NodeSnake RAT against educational institutions, showcasing evolving malware threats.
[ Load more ]