Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
New STRRAT RAT Malware Convinces People They’ve Fallen Victim to Ransomware, Researc
#1
https://hotforsecurity.bitdefender.com/b...7ctw%7CH4S            New STRRAT RAT Malware Convinces People They’ve Fallen Victim to Ransomware, Researchers Find
3 days ago
2 Min Read

Silviu STAHIE
Security researchers have discovered a new massive spam email campaign designed to push the latest version of STRRAT malware, according to data shared by Microsoft.

Ransomware attacks are among the most dangerous for people and companies alike. Having your data locked by ransomware, possibly stolen in the process, and then face blackmail is not a pleasant prospect. It turns out that some malware only impersonates a ransomware attack, leaving the files untouched but scaring people with the possibility of a ransomware infection.

STRRAT is a type of malware that imitates the behavior of ransomware without actually being ransomware. Users infected with this threat are lead to believe they have fallen victim to a much more severe attack, which is not the case. It’s also remote access trojan (RAT), which means that it can still cause harm by collecting browser passwords, allowing remote access, and even logging keystrokes, among many other features.

“This RAT is infamous for its ransomware-like behavior of appending the file name extension .crimson to files without actually encrypting them,” said the Microsoft Security Intelligence team on Twitter.

“Attackers used compromised email accounts to launch the email campaign. The emails contained an image that posed as a PDF attachment but, when opened, connected to a malicious domain to download the STRRAT malware,” they explained.

Because the attacks occur via email, the most straightforward mitigation available to users is the same as for any other possible threats — avoid opening emails from unknown sources, not to mention attachments. If they have any doubt about the veracity of an email, they should personally contact the senders to confirm. And keep an updated security solution running on the device at all times.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Kaspersky Not Trusted Anymore how the mighty have Fallen From Grace & Trust mrtrout 0 419 06-22-2024 , 11:28 PM
Last Post: mrtrout
  TSMC Falls Victim to LockBit Ransomware Threat: Hackers Demand $70M mrtrout 0 2,068 06-30-2023 , 08:24 PM
Last Post: mrtrout
  Google ads push BumbleBee malware used by ransomware gangs mrtrout 0 941 04-23-2023 , 03:59 AM
Last Post: mrtrout
  11 Million Computers Fall Victim as Info-Stealer Bypasses Major Antiviruses mrtrout 0 1,725 02-14-2023 , 09:08 PM
Last Post: mrtrout
  Bandwidth.com is latest victim of DDoS attacks against VoIP providers tarekma7 0 857 10-02-2021 , 03:06 PM
Last Post: tarekma7



Users browsing this thread: 1 Guest(s)