You searched for njRAT | SC Media

Your search for njRAT returned 17 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Your search for njRAT returned 17 results

Sort Results:

Relevant Recent

Did you mean: negat

Email Security, Security News

Aggah malspam campaign updated with new payloads

An updated Aggah malspam campaign is distributing malicious Microsoft Office documents designed to trigger a multi-stage infection in order to a target a user’s endpoint. The campaign is depositing Agent Tesla, njRAT and Nanocore RAT in a attack that is being run out of several Pastebin accounts, reported Cisco Talos. As with previous Aggah attacks,…
Operators again revive Pushdo botnet, use a popular tactic to stay hidden
Cybercrime, Malware, Security News

Years-long malware operation hides njRAT in cracked hacking tools

Malicious actors have been secretly embedding the njRAT remote access trojan in free hacking tools as well as cracks of those tools, in a bid to compromise anyone who downloads this software from various websites and forums. Essentially, this adversary is trying to turn other hackers into victims, taking over their machines for reasons that could…
Security News, Vulnerabilities

Capesand EK attacking IE, Flash vulnerabilities

The new Capesand exploit kit, possibly derived from an older EK, has been found being used to take advantage of Internet Explorer and Adobe Flash vulnerabilities. Trend Micro’s Elliot Cao, Joseph C. Chen and William Gamazo Sanchez came across Capesand while tracking a campaign that was using the Rig EK to DarkRAT and njRAT malware.…
Apache
cyberattack, Security News

OpenDocument files now being used in attacks

In a case where a malicious actor may be throwing different attack vectors against a wall to see which sticks and works best, Cisco Talos has found one group using OpenDocument files to bypass a computer’s antivirus protection. Using Microsoft Office files as a launching point for an attack is old hat, but now Cisco…
Malware, Research, Security News

Study: Ransomware generates most interest among underground forum users

An analysis of 3.9 million online posts published on underground forums found that ransomware, crypters and trojans were the most frequently referenced categories of malware and malicious tools – an indication of their popularity among forum visitors and potential cybercriminals. Web shells, remote access trojans, adware, computer viruses, FUD (fully undetectable) crypters, exploit kits and rootkits – in that…
sonicradarratbanksy_1395359
Cybercrime, Malware, Security News

Malicious developer creates wormable, fileless variant of njRAT

Researchers last week detected a new, fileless version of the malicious remote access tool njRAT that propagates as a worm via removable drives. Also known as BLADABINDI or njw0rm, the njRAT acts as a backdoor, capable of cyber espionage, keylogging, distributed denial of service attacks, retrieving and executing files, and stealing credentials from web browsers. This…
Mobile Security

Pyramid scheme: AnubisSpy Android malware steals data, seemingly links to old Sphinx campaign

A newly discovered Android spyware that victimizes Arabic-speakers has been potentially linked to the 2014-15 Sphinx cyber espionage campaign, which was launched by the threat group APT-C-15 to target PC users in the Middle East. In a Dec. 19 blog post and accompanying technical brief, researchers from Trend Micro’s Mobile Threat Response Team revealed their findings after analyzing seven apps…
Next post in Malware