Tuesday, July 7, 00:33
Home security COMpfun malware: A new version of trojan has been released!

COMpfun malware: A new version of trojan has been released!

A new variant of the remote COMPfun (RAT) trojan has been used in attacks targeting European diplomatic services. This malware was first detected and analyzed by G-Data in 2014, while in 2019 it was discovered by Kaspersky another trojan with a similar one code which can carry out man-in-the-middle (MitM) attacks on encrypted traffic, which was later named Reducer. Although G-Data does not assign COMpfun malware to a specific author malware, Kaspersky associates this trojan with Turla APT, taking into account the victims being targeted by its operators.

The new version of COMpfun malware was discovered by Kaspersky in November 2019 and includes all the features of malware RAT. Once it infects the target system, the trojan begins to collect information, which it then sends to command and control. servers (C2) of. COMpfun malware then collects location information and system data, captures window titles and all the keystrokes on the systems it violates, and even takes screenshots that allow it to steal sensitive information from the victim's computer screen. However, unlike other RATs, COMpfun malware also has the ability to spread to other devices, tracking and infecting any removable devices that are connected to the compromised devices.

The most interesting addition to this news version of COMpfun malware is HTTP status-based communication module, which helps malware operators not be easily detected, avoiding the use of known malicious motion patterns. The malware operators focused on diplomatic services and the selection of a visa-related application, Kaspersky said. Adding that the combination of an approach that adapts to their respective goals, as well as the ability to create and execute their ideas, makes them developers behind COMPfun malware are a major threat.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Pohackontas
Pohackontashttps://www.secnews.gr
Every accomplishment starts with the decision to try.

LIVE NEWS

Windows 10 2004: Unauthorized settings "block" the upgrade

Users report that they have a problem with Windows 10, since they are excluded from the application of the May 2020 update, when they manually attempt to ...
00:02:04

Lenovo is improving Linux ThinkPads but the problems remain

Last month, when Lenovo announced that it was going to certify the ThinkPad series for use with Linux operating systems, we thought directly ...

Nigerian accused of fraud against US companies

A Nigerian was taken to the federal court in Chicago on Friday, after being accused of coordinating an international cyber fraud system, which affected ...

Home routers display critical errors and run unpatched Linux

The German Fraunhofer Communication Institute (FKIE) conducted a survey that included 127 home routers from seven different brands, in an effort to ...

IPhone 12 release: Will we finally see it by the end of 2021?

New data on the release of the iPhone 12, which we all expect not to happen in September, say that it will only be delayed ...

MySQL: Replaces terms that reinforce racial discrimination

MySQL database developers have announced that they will be replacing terminology such as master, slave, blacklist, and whitelist.

The CEO of a cryptocurrency investment company was cheating

As reported by News24, Willie Breedt, the founder of VaultAge Solutions (cryptocurrency investment company), declared bankruptcy last week and the ...

United Kingdom: Will it exclude Huawei from its 5G networks?

The UK government has received an NCSC report on Huawei, which may change its policy ...

A Yahoo engineer is not in jail after hacking 6.000 accounts

A former Yahoo engineer has been sentenced to five years in prison for hacking into personal accounts ...

PoC exploits released for critical vulnerability on F5 BIG-IP devices

PoC exploits released for critical vulnerability on F5 BIG-IP devices Two days after the release of updates on critical vulnerability on F5 ...