Wednesday, 3 July 2013

PDF: njRAT uncovered

In the past thirty days (30) an increase attack activity has been observed using the "njRAT" malware. This remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID.
Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives.

No comments:

Post a Comment