Through fake browser updates and deceptive websites, the trojan is typically downloaded onto a victim's computer.Ī prior campaign in August 2022, detailed by Sucuri, revealed compromised WordPress sites displaying fraudulent Cloudflare DDoS protection pages, leading to the distribution of NetSupport RAT. Originally designed as a legitimate remote administration tool for technical assistance and support, NetSupport Manager has been exploited by malicious actors who use it as a foothold for subsequent attacks. NetSupport RAT infection has been detected in at least 15 new cases in the last few weeks alone. According to the cybersecurity firm, NetSupport RAT is delivered via deceptive updates, drive-by downloads, malware loaders (like GHOSTPULSE), and phishing campaigns. Researchers from VMware Carbon Black shared a report with The Hacker News that details how malicious actors are using a remote access trojan called NetSupport RAT to attack the education, government, and business services sectors.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |