• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
syrian hackers distributing stealthy c# based silver rat to cybercriminals

Syrian Hackers Distributing Stealthy C#-Based Silver RAT to Cybercriminals

You are here: Home / General Cyber Security News / Syrian Hackers Distributing Stealthy C#-Based Silver RAT to Cybercriminals
January 8, 2024

Danger actors running less than the identify Nameless Arabic have launched a distant access trojan (RAT) identified as Silver RAT that’s outfitted to bypass security software package and stealthily start concealed purposes.

“The developers work on a number of hacker community forums and social media platforms, showcasing an lively and complex existence,” cybersecurity organization Cyfirma stated in a report revealed final 7 days.

The actors, assessed to be of Syrian origin and connected to the enhancement of one more RAT identified as S500 RAT, also operate a Telegram channel supplying several companies such as the distribution of cracked RATs, leaked databases, carding activities, and the sale of Fb and X (formerly Twitter) bots.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

The social media bots are then used by other cyber criminals to advertise a variety of illicit services by routinely engaging with and commenting on user information.

In-the-wild detections of Silver RAT v1. had been first observed in November 2023, though the menace actor’s plans to launch the trojan ended up 1st built official a year before. It was cracked and leaked on Telegram about Oct 2023.

The C#-based mostly malware boasts of a extensive assortment of capabilities to connect to a command-and-handle (C2) server, log keystrokes, damage procedure restore factors, and even encrypt information working with ransomware. There are also indications that an Android model is in the is effective.

Silver RAT to Cybercriminals

“Even though making a payload employing Silver RAT’s builder, threat actors can pick several selections with a payload sizing up to a highest of 50kb,” the company mentioned. “After connected, the victim appears on the attacker-managed Silver RAT panel, which shows the logs from the sufferer based mostly on the functionalities chosen.”

An intriguing evasion aspect built into Silver RAT is its skill to delay the execution of the payload by a certain time as effectively as covertly start applications and choose manage of the compromised host.

Cybersecurity

Even further evaluation of the malware author’s online footprint demonstrates that one particular of the members of the team is very likely in their mid-20s and primarily based in Damascus.

“The developer […] seems supportive of Palestine based mostly on their Telegram posts, and members involved with this team are active throughout various arenas, like social media, enhancement platforms, underground discussion boards, and Clearnet sites, suggesting their involvement in distributing a variety of malware,” Cyfirma stated.

Uncovered this short article attention-grabbing? Observe us on Twitter  and LinkedIn to read through extra exclusive written content we article.


Some parts of this write-up are sourced from:
thehackernews.com

Previous Post: «unifying security tech beyond the stack: integrating secops with managed Unifying Security Tech Beyond the Stack: Integrating SecOps with Managed Risk and Strategy
Next Post: Beware! YouTube Videos Promoting Cracked Software Distribute Lumma Stealer beware! youtube videos promoting cracked software distribute lumma stealer»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.