Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
New STRRAT RAT Malware Convinces People They’ve Fallen Victim to Ransomware, Researc
#1
https://hotforsecurity.bitdefender.com/b...7ctw%7CH4S            New STRRAT RAT Malware Convinces People They’ve Fallen Victim to Ransomware, Researchers Find
3 days ago
2 Min Read

Silviu STAHIE
Security researchers have discovered a new massive spam email campaign designed to push the latest version of STRRAT malware, according to data shared by Microsoft.

Ransomware attacks are among the most dangerous for people and companies alike. Having your data locked by ransomware, possibly stolen in the process, and then face blackmail is not a pleasant prospect. It turns out that some malware only impersonates a ransomware attack, leaving the files untouched but scaring people with the possibility of a ransomware infection.

STRRAT is a type of malware that imitates the behavior of ransomware without actually being ransomware. Users infected with this threat are lead to believe they have fallen victim to a much more severe attack, which is not the case. It’s also remote access trojan (RAT), which means that it can still cause harm by collecting browser passwords, allowing remote access, and even logging keystrokes, among many other features.

“This RAT is infamous for its ransomware-like behavior of appending the file name extension .crimson to files without actually encrypting them,” said the Microsoft Security Intelligence team on Twitter.

“Attackers used compromised email accounts to launch the email campaign. The emails contained an image that posed as a PDF attachment but, when opened, connected to a malicious domain to download the STRRAT malware,” they explained.

Because the attacks occur via email, the most straightforward mitigation available to users is the same as for any other possible threats — avoid opening emails from unknown sources, not to mention attachments. If they have any doubt about the veracity of an email, they should personally contact the senders to confirm. And keep an updated security solution running on the device at all times.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  TSMC Falls Victim to LockBit Ransomware Threat: Hackers Demand $70M mrtrout 0 1,824 06-30-2023 , 08:24 PM
Last Post: mrtrout
  Google ads push BumbleBee malware used by ransomware gangs mrtrout 0 773 04-23-2023 , 03:59 AM
Last Post: mrtrout
  11 Million Computers Fall Victim as Info-Stealer Bypasses Major Antiviruses mrtrout 0 1,297 02-14-2023 , 09:08 PM
Last Post: mrtrout
  Bandwidth.com is latest victim of DDoS attacks against VoIP providers tarekma7 0 704 10-02-2021 , 03:06 PM
Last Post: tarekma7
  Ransomware statistics for 2021 Emsisoft Malware Lab mrtrout 0 1,291 07-07-2021 , 01:21 AM
Last Post: mrtrout

Forum Jump:


Users browsing this thread: 1 Guest(s)