RAT Borat is a cybersecurity risk

B2B Cyber ​​Security ShortNews

Share post

The new malware called Borat sounds funny, but it isn't. The RAT Borat is a new, sophisticated remote access Trojan that is distributed on dark web marketplaces.

Cyble security researchers have discovered new malware called Borat on the dark web. It is a so-called Remote Access Trojan (RAT) that allows attackers to take complete control of their victims' mouse and keyboard. In addition, the malware can access files and network points and almost completely camouflage itself in the system.

RAT - Remote Access Trojan - Borat

‍Borat is offered on various marketplaces on the Darknet, whether it is sold there or freely available is still unclear. Criminals who want to use the RAT receive a package that contains a builder, the individual modules of the malware, and a server certificate. This gives you an easy-to-use tool that can be used to carry out DDoS attacks and secretly gain admin rights via User Account Control (UAC) bypassing. If that's not enough for you, you also have the option of injecting ransomware into the victims' systems. The criminals can put together the range of functions of Borat individually. In this way, the individual payloads are kept as small as possible and the malware has exactly the capabilities it needs for the project of the people behind it.

Basically, Borat is more than a simple RAT, because it also includes the functions of spyware and ransomware - which of course makes it all the more dangerous! Malware of this type is typically distributed as executable files such as Office documents or as cracks for games or paid programs. The latter is a particular risk for employees working from home who also want to use their usual software at home without having to go the more costly route via corporate IT. It is all the more important to constantly remind yourself of the dangers of such malware - even if it may sometimes seem like the easier and faster way to get a program from the Internet.

More at 8com.de

 


About 8com

The 8com Cyber ​​Defense Center effectively protects the digital infrastructures of 8coms customers from cyber attacks. It includes security information and event management (SIEM), vulnerability management and professional penetration tests. It also offers the setup and integration of an Information Security Management System (ISMS) including certification according to current standards. Awareness measures, security training and incident response management round off the offer.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more