Malware News This remote access trojan just popped up on malware's most wanted list

silversurfer

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
10,336
FlawedAmmyy RAT is a potent family of malware giving hackers full remote access to PCs.

While cryptomining malware currently reigns supreme as the most prolific form of malicious software distributed by cyber criminals, a remote access trojan has entered the top ten most prolific malware threats for the first time -- and it's a particularly dangerous family.

Threat intelligence researchers at Check Point Software have tracked and published the top ten most prominent malware threats detected by its global network of sensors since late-2015, with ransomware, worms and cryptocurrency miners regularly featured in the 'most wanted' malware over the last two years.
But for the first time ever, October saw the FlawedAmmyy RAT scrape into the top ten most detected malware threats in tenth place -- making it the first remote access trojan to make the list.

Built on top of the source code of leaked Ammyy Admin remote desktop software, FlawedAmmyy first appeared near the beginning of the year and provides attackers with extensive access to the PCs of infected victims.

As it's based on legitimate remote access software, FlawedAmmyy allows its criminal users to gain a backdoor on the targeted system and the opportunity to steal files, credentials, and more. It can also be used to take screenshots and even listen in on audio and video recorded around the victim.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top