Syrian Hackers Distributing Stealthy C#-Based Silver RAT to Cybercriminals

-

Silver RAT to Cybercriminals

Risk actors working underneath the title Nameless Arabic have launched a distant entry trojan (RAT) referred to as Silver RAT that is outfitted to bypass safety software program and stealthily launch hidden purposes.

“The builders function on a number of hacker boards and social media platforms, showcasing an energetic and complex presence,” cybersecurity agency Cyfirma mentioned in a report revealed final week.

The actors, assessed to be of Syrian origin and linked to the event of one other RAT often known as S500 RAT, additionally run a Telegram channel providing numerous providers such because the distribution of cracked RATs, leaked databases, carding actions, and the sale of Fb and X (previously Twitter) bots.

The social media bots are then utilized by different cyber criminals to advertise numerous illicit providers by robotically partaking with and commenting on person content material.

In-the-wild detections of Silver RAT v1.0 have been first noticed in November 2023, though the risk actor’s plans to launch the trojan have been first made official a 12 months earlier than. It was cracked and leaked on Telegram round October 2023.

The C#-based malware boasts of a variety of options to hook up with a command-and-control (C2) server, log keystrokes, destroy system restore factors, and even encrypt information utilizing ransomware. There are additionally indications that an Android model is within the works.

Silver RAT to Cybercriminals

“Whereas producing a payload utilizing Silver RAT’s builder, risk actors can choose numerous choices with a payload measurement as much as a most of 50kb,” the corporate famous. “As soon as linked, the sufferer seems on the attacker-controlled Silver RAT panel, which shows the logs from the sufferer primarily based on the functionalities chosen.”

An attention-grabbing evasion function constructed into Silver RAT is its means to delay the execution of the payload by a particular time in addition to covertly launch apps and take management of the compromised host.

Additional evaluation of the malware writer’s on-line footprint reveals that one of many members of the group is probably going of their mid-20s and primarily based in Damascus.

“The developer […] seems supportive of Palestine primarily based on their Telegram posts, and members related to this group are energetic throughout numerous arenas, together with social media, improvement platforms, underground boards, and Clearnet web sites, suggesting their involvement in distributing numerous malware,” Cyfirma mentioned.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

ULTIMI POST

Most popular