The new malware called Borat sounds funny, but it isn't. The RAT Borat is a new, sophisticated remote access Trojan that is distributed on dark web marketplaces.
Cyble security researchers have discovered new malware called Borat on the dark web. It is a so-called Remote Access Trojan (RAT) that allows attackers to take complete control of their victims' mouse and keyboard. In addition, the malware can access files and network points and almost completely camouflage itself in the system.
RAT - Remote Access Trojan - Borat
Borat is offered on various marketplaces on the Darknet, whether it is sold there or freely available is still unclear. Criminals who want to use the RAT receive a package that contains a builder, the individual modules of the malware, and a server certificate. This gives you an easy-to-use tool that can be used to carry out DDoS attacks and secretly gain admin rights via User Account Control (UAC) bypassing. If that's not enough for you, you also have the option of injecting ransomware into the victims' systems. The criminals can put together the range of functions of Borat individually. In this way, the individual payloads are kept as small as possible and the malware has exactly the capabilities it needs for the project of the people behind it.
Basically, Borat is more than a simple RAT, because it also includes the functions of spyware and ransomware - which of course makes it all the more dangerous! Malware of this type is typically distributed as executable files such as Office documents or as cracks for games or paid programs. The latter is a particular risk for employees working from home who also want to use their usual software at home without having to go the more costly route via corporate IT. It is all the more important to constantly remind yourself of the dangers of such malware - even if it may sometimes seem like the easier and faster way to get a program from the Internet.
About 8com The 8com Cyber Defense Center effectively protects the digital infrastructures of 8coms customers from cyber attacks. It includes security information and event management (SIEM), vulnerability management and professional penetration tests. It also offers the setup and integration of an Information Security Management System (ISMS) including certification according to current standards. Awareness measures, security training and incident response management round off the offer.