Site icon The Cybersecurity Daily News

RuRAT campaign using innovative methods to get inside the system

PrivateLoader
Ransomware

RuRAT malware is being installed as part of a malicious drive; the malware allows remote access to affected devices. The attackers are masking as a venture capital firm looking to invest money or buy the victim’s site. 

An IP address of a U.K virtual server company was used to send a spear-phishing email to BleepingComputer recently. The email stated that the sender was a venture capitalist who wanted to buy the media agency’s site.

The infection chain consists of several stages.

It starts with the decoy URL drops and installs Trillian software

Once the Vuxner Trillian client is installed and exited, an installer plants a genuine remote desktop software known as RuRATSetup[.]exe and executes it

Afterwards, a C:\ swrbldin folder is generated on the victim machine, having different batch files, VBS scripts, and other files that are needed to install RuRAT.

Attackers are using new ways, false claims, to trap targeted users into installing malware. So, the professionals must always watch out for suspicious emails and report it to their security team. Further, one should never download email attachments without scanning or screening the attachment.

Reference

https://cyware.com/news/rurat-campaign-uses-innovative-lure-to-target-potential-victims-7448bee9

Exit mobile version