Cybercriminals Use Aggressive Social Engineering Tactics Against French Organizations

Cybercriminals Use Aggressive Social Engineering Tactics Against French Organizations

Symantec continues to monitor the campaign dubbed "Operation Francophoned"

Frutas RAT Used in Targeted Attacks Against High-Profile Companies in Asia and Europe

Frutas RAT Used in Targeted Attacks Against High-Profile Companies in Asia and Europe

Symantec researchers say the RAT is used to gather intel for future attacks

Cybercriminals Launch Tool to Repackage Legitimate Android Apps with RAT

Cybercriminals Launch Tool to Repackage Legitimate Android Apps with RAT

Symantec has already spotted 23 legitimate apps trojanized with AndroRAT

Java RAT Used in Spear Phishing Attacks Against US Government Agencies

Java RAT Used in Spear Phishing Attacks Against US Government Agencies

Because the RAT is a Java applet, it can run on several operating systems

Government, Telecom and Energy Sectors in the Middle East Targeted with njRAT

Government, Telecom and Energy Sectors in the Middle East Targeted with njRAT

Fidelis Security Systems researchers have analyzed the threat

Ghost RAT Distributed via Taiwan Bureau of National Health Insurance Phishing Emails

Ghost RAT Distributed via Taiwan Bureau of National Health Insurance Phishing Emails

One individual suspected of being involved in the scheme has been arrested

PoisonIvy Variant Abuses Legitimate Application as Loader

PoisonIvy Variant Abuses Legitimate Application as Loader

The technique is called binary planting, or DLL preloading attack

RARSTONE RAT Used in Targeted Attacks Against Asian Organizations

RARSTONE RAT Used in Targeted Attacks Against Asian Organizations

Trend Micro experts have analyzed the campaign they call Naikon

AutoIt Scripting Language Increasingly Used by Malware Authors

AutoIt Scripting Language Increasingly Used by Malware Authors

Trend Micro experts have identified numerous malicious tools

  • Green
  • By Laura Sinpetru
  • March 21st, 2013
Rat Reportedly Caused Fukushima's Power Failure

Rat Reportedly Caused Fukushima's Power Failure

The rodent chewed on some cables, caused a short circuit

Foot-Long (30-Cm) Rat Attacks Sleeping Girl, Is Killed by Dog

Foot-Long (30-Cm) Rat Attacks Sleeping Girl, Is Killed by Dog

Francesca Williams' face and arm were bitten by the large rodent

New RemoteIt RAT Advertised on Hacker Forums

New RemoteIt RAT Advertised on Hacker Forums

Security researcher Suriya Prakash has analyzed the RAT

Cybercriminals Rely on Legitimate NVIDIA App in Attacks Against Tibetans

Cybercriminals Rely on Legitimate NVIDIA App in Attacks Against Tibetans

The attackers' goal is to drop a version of the PlugX RAT onto the target host

Trend Micro Warns of New BKDR_RARSTONE Remote Access Trojan

Trend Micro Warns of New BKDR_RARSTONE Remote Access Trojan

The RAT uses some clever techniques to take control of a machine

Frutas: Java-Based Cross-Platform RAT

Frutas: Java-Based Cross-Platform RAT

Symantec experts have analyzed the tool that is mainly used by Spanish hackers

FAKEM RATs Disguise Their Traffic as Yahoo! Messenger to Avoid Detection

FAKEM RATs Disguise Their Traffic as Yahoo! Messenger to Avoid Detection

Trend Micro has released a white paper that details these RATs

PlugX RAT Developers Release New Version, Become More Confident

PlugX RAT Developers Release New Version, Become More Confident

Kaspersky experts have found that the error logging function has been removed

 
Want more? Browse: