![]() They are used for a variety of criminal activity, including “sextortion”. Most RATs are easy to use and thus attract novices. There are numerous RATs available for free and for purchase in online forums, chat rooms and market places on the Internet. From an analyst’s perspective, it is unclear whether these actors choose to use this type of malware simply out of convenience or in a deliberate effort to blend in with traditional cybercrime groups, who also use these same tools. However, it is difficult to distinguish and correlate the activity of targeted threat actors based solely on their preference to use particular malware - especially, freely available malware. As a result, the threat posed by these RATs should not be underestimated. This pre-built malware has all the functionality needed to conduct cyber espionage and is controlled directly by humans, who have the ability to adapt to network defenses. Rather than building custom malware, many threat actors behind targeted attacks use publicly or commercially available remote access Trojans (RATs). Create a Free Mandiant Advantage Account.Noteholder and Preferred Shareholder Documents.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |