- This HP Chromebook made living without Windows easier than I expected (and it's $137 off)
- I'm a long-time YouTube video producer - these 3 AI tools help me do it better and faster
- US Arrest Man for SEC X Account Hack
- ‘취약점 평가부터 침투 테스트까지…’ AI로 공격형 사이버 보안을 개선하는 방법
- Google's AI podcast generator just got more customizable, and I put it to the test
CRAT wants to plunder your endpoints – Cisco Blogs
By Asheer Malhotra.
- Cisco Talos has observed a new version of a remote access trojan (RAT) family known as CRAT.
- Apart from the prebuilt RAT capabilities, the malware can download and deploy additional malicious plugins on the infected endpoint.
- One of the plugins is a ransomware known as “Hansom.”
- CRAT has been attributed to the Lazarus APT Group in the past.
- The RAT consists of multiple obfuscation techniques to hide strings, API names, command and control (C2) URLs and instrumental functions, along with static detection evasion.
- The attack also employs a multitude of anti-infection checks to evade sandbox based detection systems.
What’s new?
Cisco Talos has recently discovered a new version of the CRAT malware family. This version consists of multiple RAT capabilities, additional plugins and a variety of detection-evasion techniques. In the past, CRAT has been attributed to the Lazarus Group, the malicious threat actors behind multiple cyber campaigns, including attacks against the entertainment sector.
Indicators and tactics, techniques and procedures (TTPs) discovered by this investigation resemble those of the Lazarus Group.
Share: