New Shameless Commodity Cryptocurrency Stealer (WeSteal) and Commodity RAT (WeControl) 50,658 people reacted New Shameless Commodity Cryptocurrency Stealer (WeSteal) and Commodity RAT (WeControl) By Robert Falcone and Simon Conant April 29, 2021 at 12:01 AM 35 9 min. read
34,899 people reacted GuLoader: Malspam Campaign Installing NetWire RAT By Brad Duncan April 3, 2020 at 6:00 AM 25 6 min. read
Cortex XDR™ Detects New Phishing Campaign Installing NetSupport Manager RAT 44,294 people reacted Cortex XDR™ Detects New Phishing Campaign Installing NetSupport Manager RAT By Mike Harbison, Brittany Barbehenn and Bryan Lee February 27, 2020 at 6:00 AM 34 9 min. read
Rancor: Cyber Espionage Group Uses New Custom Malware to Attack Southeast Asia 58,748 people reacted Rancor: Cyber Espionage Group Uses New Custom Malware to Attack Southeast Asia By Jen Miller-Osborn and Mike Harbison December 17, 2019 at 5:30 AM 34 7 min. read
Imminent Monitor – a RAT Down Under 52,435 people reacted Imminent Monitor – a RAT Down Under By Unit 42 December 2, 2019 at 6:00 AM 19 9 min. read
Blackremote: Money Money Money – A Swedish Actor Peddles an Expensive New RAT 44,304 people reacted Blackremote: Money Money Money – A Swedish Actor Peddles an Expensive New RAT By Unit 42 October 15, 2019 at 6:00 AM 10 8 min. read
46,820 people reacted NOKKI Almost Ties the Knot with DOGCALL: Reaper Group Uses New Malware to Deploy RAT By Josh Grunzweig October 1, 2018 at 8:00 AM 2 8 min. read
59,038 people reacted Say “Cheese”: WebMonitor RAT Comes with C2-as-a-Service (C2aaS) By Mike Harbison and Simon Conant April 13, 2018 at 5:00 AM 5 8 min. read
43,482 people reacted EITest: HoeflerText Popups Targeting Google Chrome Users Now Push RAT Malware By Brad Duncan September 1, 2017 at 5:00 AM 0 5 min. read
53,685 people reacted Updated KHRAT Malware Used in Cambodia Attacks By Alex Hinchliffe and Jen Miller-Osborn August 31, 2017 at 5:00 AM 7 15 min. read
53,485 people reacted Trochilus and New MoonWind RATs Used In Attack Against Thai Organizations By Jen Miller-Osborn and Josh Grunzweig March 30, 2017 at 5:00 AM 5 7 min. read
Investigating the LuminosityLink Remote Access Trojan Configuration By Josh Grunzweig July 8, 2016 at 5:00 AM 6 7 min. read
Bookworm Trojan: A Model of Modular Architecture By Robert Falcone, Mike Scott and Juan Cortes November 10, 2015 at 11:00 AM 5 10 min. read