Keep your eyes on these

VERY IMPORTANT

Security Articles

RSS

RATicate upgrades RATs as a Service attacks with commercial crypter

released on 2020-07-14 @ 04:33:37 PM
In May, Sophos reported initial findings on RATicate, a group of actors spreading remote administration tools (RATs) and other information-stealing malware at least since last year. We tracked multiple malicious spam (“malspam”) email campaigns from the group, with attached installers that usually posed as documents related to financial transactions. In recent campaigns, the group’s tactics have shifted, as the actors employed a new malware “loader” in order to unpack and install RAT and info-stealer payloads in a more stealthy way. As discussed in our original report, the RATicate group had since last November been packing their RAT and info-stealer payloads for deployment via e-mail exclusively with custom NSIS installers. But in February, the group started to switch to a new delivery mechanism. Initially identified (by researchers at CheckPoint) as Guloader, the new Visual Basic 6-based installer was tied to a publicly-marketed installation builder called CloudEyE.