JRAT logo

Symantec: New Spam Campaign with JRAT

JRAT logo
JRat

Campaigns with remote Trojan ς με Java ( RAT ) δεν είναι σπάνιες πια. Η κυκλοφορία τους έχει αυξηθεί τα τελευταία χρόνια και εξακολουθούν να στοχεύουν επιχειρήσεις αλλά και ιδιώτες. Η δημοτικότητα αυτών των εκστρατειών δεν αποτελεί έκπληξη, καθώς αν ένας εισβολέας μολύνει τον υπολογιστή του θύματος με ένα RAT, τότε μπορεί να αποκτήσει τον πλήρη έλεγχο του υπολογιστή. Μαζί με αυτό, αυτές οι απειλές δεν περιορίζονται μονάχα σε ένα λειτουργικό σύστημα, αλλά σε οποιονδήποτε υπολογιστή τρέχει Java. Οι επιτιθέμενοι έχουν εύκολη πρόσβαση στα Java RATs χάρη στο γεγονός ότι ο πηγαίος κώδικας κυκλοφορεί ελεύθερα στο .

As the Symantec, noticed a new spam campaign that distributes a Java RAT known as JRAT, which was launched on February 13 2014. The sender of the spam e-mail claims to have attached a payment certificate to the message and asks the user to confirm that it has received it.
JRat

The email actually contains a malicious attachment with Paymentcert.jar file, and is detected as Trojan.Maljava. If the Trojan is executed, it will run JRAT, detected as Backdoor.Jeetrat. The RAT not only affects Windows PCs, but also Linux, Mac OSX, FreeBSD, OpenBSD, and Solaris computers. This RAT is not new as we have seen it in previous targeted attacks. The JRAT builder, as shown in the image below, shows how easy it is for an attacker to create their own custom RAT.

JRAT2

Symantec telemetry shows that the campaign has primarily affected the United Arab Emirates and the .

JRAT3

This campaign seems to target specific people. Some aspects of the attack seem to confirm the targeted nature of the campaign, such as the small number of victims, a single messenger, a single server as a command and control center (C&C) and the fact that the majority of these spam messages were sent to personal addresses email.

JRAT4

Symantec recommends to be very careful when receiving unsolicited, unexpected, or suspicious emails. If you are not sure about the legitimacy of the email, then do not open it, or if you do open it, do not do what it asks you to do, such as clicking on links or opening attachments.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.089 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).