03-25-2019 , 10:19 PM
- Its capabilities include uploading or downloading files, manipulating running processes and services, capturing screenshots of victim’s computers, recording audios and videos via microphone or webcameras, and interacting with the registry.
- Its victims include financial organizations, telecom companies, gaming companies, the IT sector, the energy and utility sector, and more.
Xtreme RAT which was developed by ‘xtremecoder’ is written in Delphi. The Remote Access Trojan is active since 2010. The source code of Xtreme RAT has been leaked online.
Its capabilities include uploading or downloading files, manipulating running processes and services, capturing screenshots of victim’s computers, recording audios and videos via microphone or webcameras, and interacting with the registry.
Xtreme RAT has infected several financial organizations, telecom companies, gaming companies, the IT sector, the energy and utility sector, and more.
Xtreme RAT attacks against Israel
- In 2012, Attackers used Xtreme RAT to target Israeli and Palestinian governments.
- In 2015, attackers gained unauthorized access to Israel defense systems and compromised the systems using the Xtreme RAT.