• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
syrian hackers distributing stealthy c# based silver rat to cybercriminals

Syrian Hackers Distributing Stealthy C#-Based Silver RAT to Cybercriminals

You are here: Home / General Cyber Security News / Syrian Hackers Distributing Stealthy C#-Based Silver RAT to Cybercriminals
January 8, 2024

Danger actors running less than the identify Nameless Arabic have launched a distant access trojan (RAT) identified as Silver RAT that’s outfitted to bypass security software package and stealthily start concealed purposes.

“The developers work on a number of hacker community forums and social media platforms, showcasing an lively and complex existence,” cybersecurity organization Cyfirma stated in a report revealed final 7 days.

The actors, assessed to be of Syrian origin and connected to the enhancement of one more RAT identified as S500 RAT, also operate a Telegram channel supplying several companies such as the distribution of cracked RATs, leaked databases, carding activities, and the sale of Fb and X (formerly Twitter) bots.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

The social media bots are then used by other cyber criminals to advertise a variety of illicit services by routinely engaging with and commenting on user information.

In-the-wild detections of Silver RAT v1. had been first observed in November 2023, though the menace actor’s plans to launch the trojan ended up 1st built official a year before. It was cracked and leaked on Telegram about Oct 2023.

The C#-based mostly malware boasts of a extensive assortment of capabilities to connect to a command-and-handle (C2) server, log keystrokes, damage procedure restore factors, and even encrypt information working with ransomware. There are also indications that an Android model is in the is effective.

Silver RAT to Cybercriminals

“Even though making a payload employing Silver RAT’s builder, threat actors can pick several selections with a payload sizing up to a highest of 50kb,” the company mentioned. “After connected, the victim appears on the attacker-managed Silver RAT panel, which shows the logs from the sufferer based mostly on the functionalities chosen.”

An intriguing evasion aspect built into Silver RAT is its skill to delay the execution of the payload by a certain time as effectively as covertly start applications and choose manage of the compromised host.

Cybersecurity

Even further evaluation of the malware author’s online footprint demonstrates that one particular of the members of the team is very likely in their mid-20s and primarily based in Damascus.

“The developer […] seems supportive of Palestine based mostly on their Telegram posts, and members involved with this team are active throughout various arenas, like social media, enhancement platforms, underground discussion boards, and Clearnet sites, suggesting their involvement in distributing a variety of malware,” Cyfirma stated.

Uncovered this short article attention-grabbing? Observe us on Twitter  and LinkedIn to read through extra exclusive written content we article.


Some parts of this write-up are sourced from:
thehackernews.com

Previous Post: «unifying security tech beyond the stack: integrating secops with managed Unifying Security Tech Beyond the Stack: Integrating SecOps with Managed Risk and Strategy
Next Post: Beware! YouTube Videos Promoting Cracked Software Distribute Lumma Stealer beware! youtube videos promoting cracked software distribute lumma stealer»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.