• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

HotRat: New Variant of AsyncRAT Malware Spreading Through Pirated Software

You are here: Home / General Cyber Security News / HotRat: New Variant of AsyncRAT Malware Spreading Through Pirated Software
July 21, 2023

A new variant of AsyncRAT malware dubbed HotRat is remaining dispersed through free, pirated variations of well-liked software package and utilities these types of as movie video games, picture and seem enhancing computer software, and Microsoft Business.

“HotRat malware equips attackers with a large array of abilities, such as stealing login credentials, cryptocurrency wallets, screen capturing, keylogging, putting in more malware, and attaining accessibility to or altering clipboard details,” Avast security researcher Martin a Milánek reported.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The Czech cybersecurity business explained the trojan has been commonplace in the wild because at least in October 2022, with a the vast majority of the bacterial infections concentrated in Thailand, Guyana, Libya, Suriname, Mali, Pakistan, Cambodia, South Africa, and India.

The attacks entail bundling the cracked computer software readily available on the web through torrent sites with a destructive AutoHotkey (AHK) script that initiates an infection chain intended to deactivate antivirus remedies on the compromised host and ultimately start the HotRat payload utilizing a Visible Standard Script loader.

Forthcoming WEBINARShield Versus Insider Threats: Master SaaS Security Posture Management

Concerned about insider threats? We have received you lined! Be a part of this webinar to explore realistic procedures and the tricks of proactive security with SaaS Security Posture Administration.

Sign up for Nowadays

HotRat, described as a extensive RAT malware, arrives with just about 20 commands, just about every of which executes a .NET module retrieved from a remote server, allowing for the threat actors powering the marketing campaign to increase its functions as and when required.

That said, it’s well worth noting that the attack requires administrative privileges to correctly understand its objectives.

“Despite the considerable risks included, the irresistible temptation to get substantial-top quality software program at no cost persists, primary a lot of men and women to down load illegal application,” Milánek said. “Consequently, distributing this sort of computer software continues to be an helpful system for widely spreading malware.”

Located this article exciting? Observe us on Twitter  and LinkedIn to go through more unique material we write-up.


Some elements of this report are sourced from:
thehackernews.com

Previous Post: «sophisticated bundlebot malware disguised as google ai chatbot and utilities Sophisticated BundleBot Malware Disguised as Google AI Chatbot and Utilities
Next Post: Azure AD Token Forging Technique in Microsoft Attack Extends Beyond Outlook, Wiz Reports azure ad token forging technique in microsoft attack extends beyond»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk
  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Copyright © TheCyberSecurity.News, All Rights Reserved.