Nation-State RAT Attack Vectors Get Smarter

frogboy

In memoriam 1961-2018
Thread author
Verified
Top Poster
Well-known
Jun 9, 2013
6,720
A more sophisticated technique for deploying remote access trojans (RATs) has been observed, used by a handful of countries across Asia.

According to SentinelOne analysis, nation-state attackers have been successfully deploying RATs for years to remotely control user systems—giving them full access to the victim’s files or resources such as cameras, recording key strokes or downloading further malware. Traditionally, RATs have been deployed when a user opens an email attachment, or downloads a file from a website or peer-to-peer network. In both cases, these vectors involve use of files to deliver the payload—which are easier to detect.

The new technique ensures that the payload/file remains in memory through its execution, never touching the disk in a de-encrypted state.

“In doing so, the attacker can remain out of view from antivirus technologies, and even ‘next-generation’ technologies that only focus on file-based threat vectors,” said SentinelOne. “Also, the samples analyzed have the ability to detect the presence of a virtual machine to ensure it’s not being analyzed in a network sandbox.”

The technique can be used to deliver any known RAT to a victim’s system.

Earlier in the year, a multi-pronged attack campaign involving various government websites and non-governmental organizations in Asia was uncovered, using a RAT named ‘Trochilus.’ That campaign was driven by East Asian threat actors.

Full Article. Nation-State RAT Attack Vectors Get Smarter
 

cruelsister

Level 43
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 13, 2013
3,224
The issue with these RAT's are that they are invariably signed (most with very high quality certificates); so they will be installed without detection and run with most security setups silently.
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
RAT's are smart enough, which why its a part of concept to bypass any security software. Some may behave benign however it other case may affect the other aspect since it promotes disguise as safe but deadly on attacks.
 
  • Like
Reactions: Der.Reisende

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top