• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
nicerat malware targets south korean users via cracked software

NiceRAT Malware Targets South Korean Users via Cracked Software

You are here: Home / General Cyber Security News / NiceRAT Malware Targets South Korean Users via Cracked Software
June 17, 2024

Menace actors have been observed deploying a malware known as NiceRAT to co-decide contaminated devices into a botnet.

The attacks, which goal South Korean buyers, are designed to propagate the malware below the guise of cracked computer software, these types of as Microsoft Windows, or equipment that purport to provide license verification for Microsoft Business.

“Owing to the nature of crack packages, information sharing among normal end users contributes to the malware’s distribution independently from the first distributor,” the AhnLab Security Intelligence Centre (ASEC) said.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“Simply because threat actors typically explain methods to take away anti-malware packages during the distribution phase, it is complicated to detect the distributed malware.”

Alternate distribution vectors contain the use of a botnet comprising zombie personal computers that are infiltrated by a distant access trojan (RAT) acknowledged as NanoCore RAT, mirroring prior activity that leveraged the Nitol DDoS malware for propagating one more malware dubbed Amadey Bot.

Cybersecurity

NiceRAT is an actively developed open up-resource RAT and stealer malware published in Python that takes advantage of a Discord Webhook for command-and-regulate (C2), enabling the menace actors to siphon sensitive information and facts from the compromised host.

Initially produced on April 17, 2024, the recent model of the method is 1.1.. It really is also readily available as a premium variation, according to its developer, suggesting that it is really advertised below the malware-as-a-provider (MaaS) model.

The development will come amid the return of a cryptocurrency mining botnet referred to as Bondnet, which has been detected making use of the significant-effectiveness miner bots as C2 servers given that 2023 by configuring a reverse proxy working with a modified edition of a legit resource referred to as Quick Reverse Proxy (FRP).

Identified this write-up appealing? Comply with us on Twitter  and LinkedIn to examine more unique content we put up.


Some elements of this article are sourced from:
thehackernews.com

Previous Post: «u.k. hacker linked to notorious scattered spider group arrested in U.K. Hacker Linked to Notorious Scattered Spider Group Arrested in Spain
Next Post: Hackers Exploit Legitimate Websites to Deliver BadSpace Windows Backdoor hackers exploit legitimate websites to deliver badspace windows backdoor»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.