New Shameless Commodity Cryptocurrency Stealer (WeSteal) and Commodity RAT (WeControl) 44,102 people reacted New Shameless Commodity Cryptocurrency Stealer (WeSteal) and Commodity RAT (WeControl) By Robert Falcone and Simon Conant April 29, 2021 at 12:01 AM 35 9 min. read
28,743 people reacted GuLoader: Malspam Campaign Installing NetWire RAT By Brad Duncan April 3, 2020 at 6:00 AM 24 6 min. read
Cortex XDR™ Detects New Phishing Campaign Installing NetSupport Manager RAT 40,198 people reacted Cortex XDR™ Detects New Phishing Campaign Installing NetSupport Manager RAT By Mike Harbison, Brittany Barbehenn and Bryan Lee February 27, 2020 at 6:00 AM 34 9 min. read
Rancor: Cyber Espionage Group Uses New Custom Malware to Attack Southeast Asia 51,467 people reacted Rancor: Cyber Espionage Group Uses New Custom Malware to Attack Southeast Asia By Jen Miller-Osborn and Mike Harbison December 17, 2019 at 5:30 AM 34 7 min. read
Imminent Monitor – a RAT Down Under 44,335 people reacted Imminent Monitor – a RAT Down Under By Unit 42 December 2, 2019 at 6:00 AM 17 9 min. read
Blackremote: Money Money Money – A Swedish Actor Peddles an Expensive New RAT 41,199 people reacted Blackremote: Money Money Money – A Swedish Actor Peddles an Expensive New RAT By Unit 42 October 15, 2019 at 6:00 AM 10 8 min. read
40,226 people reacted NOKKI Almost Ties the Knot with DOGCALL: Reaper Group Uses New Malware to Deploy RAT By Josh Grunzweig October 1, 2018 at 8:00 AM 2 8 min. read
53,118 people reacted Say “Cheese”: WebMonitor RAT Comes with C2-as-a-Service (C2aaS) By Mike Harbison and Simon Conant April 13, 2018 at 5:00 AM 5 8 min. read
38,891 people reacted EITest: HoeflerText Popups Targeting Google Chrome Users Now Push RAT Malware By Brad Duncan September 1, 2017 at 5:00 AM 0 5 min. read
48,007 people reacted Updated KHRAT Malware Used in Cambodia Attacks By Alex Hinchliffe and Jen Miller-Osborn August 31, 2017 at 5:00 AM 7 15 min. read
46,224 people reacted Trochilus and New MoonWind RATs Used In Attack Against Thai Organizations By Jen Miller-Osborn and Josh Grunzweig March 30, 2017 at 5:00 AM 5 7 min. read
Investigating the LuminosityLink Remote Access Trojan Configuration By Josh Grunzweig July 8, 2016 at 5:00 AM 5 7 min. read
Bookworm Trojan: A Model of Modular Architecture By Robert Falcone, Mike Scott and Juan Cortes November 10, 2015 at 11:00 AM 5 10 min. read