Tuesday, July 14, 01:30
Home security Swedish hacker found to sell Blackremote RAT

Swedish hacker found to sell Blackremote RAT

A Swedish hacker has been spotted trying to sell a new document-free Remote Access Tool (RAT). It was named Blackremote by Palo Alto Networks researchers, and the hacker was trying to sell RAT on a dark web forum last month. The hacker, who uses Speccy and Rafiki, has also posted a YouTube video with instructions on how to install RAT.

Blackremote RAT

The video description on YouTube included a link to the website staff. The video has been marked as private.

“It also claimed that this Blackremote RAT is undetectable during runtime and that there is a link to the purchase of the FUD cryptocurrency. There is no legitimate reason for this software to have to be "undetectable" or "encrypted". Instead, these efforts are aimed at preventing malware detection by software, ”the researchers said.

The hacker described the malware as a "powerful and fully equipped systems" remote management suite.

“It will give you full access and control over a remote machine through a myriad of numbers functions, enabling you to monitor, access or control any activity and data from a distance, as if it were right in front of you! ”the description states.

Researchers have stated that the Blackremote RAT is higher than other RATs, as the tool is available for $ 49 (£ 44) for 31 days leave, $ 117 for 93 days and $ 438 for one year. Buyers should buy the RAT using cryptocurrencies such as Bitcoin.

RAT features include remote desktop, remote file manager, remote webcam, keystoke recording and remote audio.

The researchers have said that RATs have often been sold online for years, their creators reaping benefits while allowing hackers to spread thousands of samples malware built with RAT builders.

Matt Aldridge, senior solutions architect at Webroot, told SC Media UK that organizations should not rely on any signature-based or rule-based malware detection and ensure that they use next-generation anti-malware that uses this type of detection of Remote Access Trojan.

“Organizations should also check the addresses URL accessed from their devices, ensuring that the reputation data and high grade are embedded in endpoint on the gateways and / or through a security platform DNS - this can mitigate the initial download and command-and-control communications of such tools, ”he said.

Javvad Malik, security awareness consultant at KnowBe4, told SC Media UK that there should be robust crawling controls to detect if RAT "does" it on the network.

"This can be done in conjunction with a reliable source of threat information that is constantly updated with the latest compromise indicators," he said.

To catch him criminal"We often see many organizations and countries co-operating and sharing law enforcement resources because most criminals operate across borders to slow down and discourage authorities," he added.


Please enter your comment!
Please enter your name here

Teo Ehc
Teo Ehchttps://www.secnews.gr
Be the limited edition.


Ryzen 7 1700 vs. Ryzen 3 3300X: 8 cores vs. 4

AMD's favorite classic old generation, Ryzen 7 1700, is being tested and compared to its direct competitor, the 4-core Ryzen 3 ...

Browser War: Safari and Edge threaten Chrome

The new Edge browser, released for Windows 10 Home and now available for download on Mac, is based on Chromium, which ...

PC sales worldwide have increased due to coronavirus

The outbreak of the coronavirus pandemic has affected all areas of our lives. After health and other industries have been hit ...

MIT: They make a robot handle that will be able to distinguish cables!

MIT researchers have developed a robot handle with the ability to handle very thin objects such as ropes and cables, according to a statement.

Fedora 33: Will contain Nano as the default text editor

Have you ever thought, who is your favorite text editor, when we talk about operating systems based on ...

Hacker was selling databases of the Ukrainian government

A Ukrainian hacker has been arrested for selling confidential information collected from Ukrainian government databases. According to a ...

TikTok downloaded 49 million videos that violated the terms of use

TikTok downloaded more than 49 million videos from users around the world in the second half of 2019, according to ...

United Kingdom: Is Huawei's immediate foreclosure "dangerous"?

Philip Jansen, CEO of the British telecommunications company "BT", stated that any government move demands the immediate exclusion of the Huawei kit from ...

Dark Mode comes in Google Docs, Sheets and Slides for Android

Do you spend a lot of time using Google Docs, Sheets or Slides on your Android phone or tablet? We have good news for you ...

Hackers seek to exploit vulnerabilities in Citrix ADC

Last week, Citrix released fixes for a total of 11 vulnerabilities in some of its most popular products, in which ...