![]() The malicious “Final Resume.doc” file that is being examined was found in the wild and it came via a spear-phishing campaign. This blog gets into the details of one such tool, Remote Utilities, which has an in-built feature that can be easily exploited by the threat actors to intrude into the victims’ system and use it for malicious purposes, thereby reducing the time and effort needed to launch an attack. Few freeware tools available online make this work simpler for them. Most of the RAT attacks are complex and need some effort from the threat actors to compromise the victims’ system. However, when these are used for malicious purposes they are known as Remote Access Trojan (RAT). Remote access software tools are used by system administrators to remotely access or control a system.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |