New Shameless Commodity Cryptocurrency Stealer (WeSteal) and Commodity RAT (WeControl) 49,083 people reacted New Shameless Commodity Cryptocurrency Stealer (WeSteal) and Commodity RAT (WeControl) By Robert Falcone and Simon Conant April 29, 2021 at 12:01 AM 35 9 min. read
33,190 people reacted GuLoader: Malspam Campaign Installing NetWire RAT By Brad Duncan April 3, 2020 at 6:00 AM 25 6 min. read
Cortex XDR™ Detects New Phishing Campaign Installing NetSupport Manager RAT 42,582 people reacted Cortex XDR™ Detects New Phishing Campaign Installing NetSupport Manager RAT By Mike Harbison, Brittany Barbehenn and Bryan Lee February 27, 2020 at 6:00 AM 34 9 min. read
Rancor: Cyber Espionage Group Uses New Custom Malware to Attack Southeast Asia 57,248 people reacted Rancor: Cyber Espionage Group Uses New Custom Malware to Attack Southeast Asia By Jen Miller-Osborn and Mike Harbison December 17, 2019 at 5:30 AM 34 7 min. read
Imminent Monitor – a RAT Down Under 50,187 people reacted Imminent Monitor – a RAT Down Under By Unit 42 December 2, 2019 at 6:00 AM 17 9 min. read
Blackremote: Money Money Money – A Swedish Actor Peddles an Expensive New RAT 43,357 people reacted Blackremote: Money Money Money – A Swedish Actor Peddles an Expensive New RAT By Unit 42 October 15, 2019 at 6:00 AM 10 8 min. read
44,640 people reacted NOKKI Almost Ties the Knot with DOGCALL: Reaper Group Uses New Malware to Deploy RAT By Josh Grunzweig October 1, 2018 at 8:00 AM 2 8 min. read
57,184 people reacted Say “Cheese”: WebMonitor RAT Comes with C2-as-a-Service (C2aaS) By Mike Harbison and Simon Conant April 13, 2018 at 5:00 AM 5 8 min. read
41,991 people reacted EITest: HoeflerText Popups Targeting Google Chrome Users Now Push RAT Malware By Brad Duncan September 1, 2017 at 5:00 AM 0 5 min. read
51,866 people reacted Updated KHRAT Malware Used in Cambodia Attacks By Alex Hinchliffe and Jen Miller-Osborn August 31, 2017 at 5:00 AM 7 15 min. read
51,122 people reacted Trochilus and New MoonWind RATs Used In Attack Against Thai Organizations By Jen Miller-Osborn and Josh Grunzweig March 30, 2017 at 5:00 AM 5 7 min. read
Investigating the LuminosityLink Remote Access Trojan Configuration By Josh Grunzweig July 8, 2016 at 5:00 AM 5 7 min. read
Bookworm Trojan: A Model of Modular Architecture By Robert Falcone, Mike Scott and Juan Cortes November 10, 2015 at 11:00 AM 5 10 min. read