• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new bandook rat variant resurfaces, targeting windows machines

New Bandook RAT Variant Resurfaces, Targeting Windows Machines

You are here: Home / General Cyber Security News / New Bandook RAT Variant Resurfaces, Targeting Windows Machines
January 5, 2024

A new variant of remote obtain trojan termed Bandook has been observed remaining propagated by way of phishing attacks with an goal to infiltrate Windows devices, underscoring the ongoing evolution of the malware.

Fortinet FortiGuard Labs, which determined the activity in Oct 2023, claimed the malware is distributed via a PDF file that embeds a link to a password-shielded .7z archive.

“Immediately after the sufferer extracts the malware with the password in the PDF file, the malware injects its payload into msinfo32.exe,” security researcher Pei Han Liao mentioned.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Bandook, first detected in 2007, is an off-the-shelf malware that comes with a huge variety of capabilities to remotely get regulate of the contaminated programs.

Cybersecurity

In July 2021, Slovak cybersecurity company ESET thorough a cyber espionage campaign that leveraged an upgraded variant of Bandook to breach company networks in Spanish-speaking countries such as Venezuela.

Bandook RAT

The commencing issue of the most up-to-date attack sequence is an injector ingredient that’s designed to decrypt and load the payload into msinfo32.exe, a respectable Windows binary that gathers system details to diagnose laptop issues.

The malware, besides creating Windows Registry improvements to build persistence on the compromised host, establishes get hold of with a command-and-handle (C2) server to retrieve additional payloads and instructions.

“These actions can be around classified as file manipulation, registry manipulation, download, data stealing, file execution, invocation of functions in DLLs from the C2, controlling the victim’s laptop, approach killing, and uninstalling the malware,” Han Liao said.

Identified this write-up attention-grabbing? Follow us on Twitter  and LinkedIn to study more unique content we article.


Some pieces of this report are sourced from:
thehackernews.com

Previous Post: «three ways to supercharge your software supply chain security Three Ways To Supercharge Your Software Supply Chain Security
Next Post: Russian Hackers Had Covert Access to Ukraine’s Telecom Giant for Months russian hackers had covert access to ukraine's telecom giant for»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.