Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - Got Geek?

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews



IObit Black Friday Sale

spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. MusicBee
4. Microsoft Visual C++ 2015-2022 Redistributable Package
5. Sergei Strelec's WinPE
6. Visual C++ Redistributable Runtimes AIO Repack
7. Smart Defrag
8. HiBit Uninstaller
9. K-Lite Mega Codec Pack
10. ImgBurn
More >>

top reads

Star 10 File Explorer Tips To Work Smarter

Star How To Disable (or Uninstall) OneDrive

Star Quick Machine Recovery Explained: What It Is and How To Enable It

Star How to Auto-Switch Between Light and Dark Mode With PowerToys

Star How To Automatically Lock Your PC in Windows 11

Star What To Do When Microsoft Flags Unusual Sign-in Activity on Your Account

Star How To Remove the Windows 11 Updated Start Menu

Star How To Disable Drag Tray

Star How To Permanently Delete Files Without Sending Them to the Recycle Bin in Windows 11

Star How To Repair Install Windows 11, and Keep All Your Files and Apps


MajorGeeks.Com » News » April 2017 » Java-based Remote Access Trojan More Active

Java-based Remote Access Trojan More Active


Posted by: Timothy Weaver on 04/17/2017 07:52 PM [ comments Comments ]


Miscreants are using a Java-based remote access trojan variant in order to open a backdoor for attackers to remotely gain control of an infected system.

The malware takes the usual method of coming in the form of a phishing email with an attachment. The emails can come in the form of a tax notice supposedly sent by the IRS. Others are purportedly purchase orders. In either case, clicking on the attachment and the jRAT payload is transferred to the target machine.

"We have seen multiple campaigns, such as purchase orders, invoices, tracking notices, etc., where jRAT was involved," Sameer Patil of the ThreatLabZ research team reported. The most significant iteration was using the IRS theme that started in the last week of March, he said.

"There were a few other unusual aspects to this malware," Patil added. "First, the majority of the payloads were being delivered over SSL using media/file sharing services like Dropbox. Another novel aspect was the multiple layers of packing combined with the highly obfuscated code-end payload in order to evade detection and hinder manual/automated analysis and reverse engineering. The malware author has also accounted for the operating system's bit-ness by embedding both 32-bit and 64-bit DLLs in the JAR payload."

The campaign is still active and using current events as hooks.

Source: SCMagazine


« Shoney’s Latest to be Hit With Credit Card Breach · Java-based Remote Access Trojan More Active · EVGA Video Card Sale: 1060 for $189, 1070 for $399 »




Comments
comments powered by Disqus

MajorGeeks.Com » News » April 2017 » Java-based Remote Access Trojan More Active

© 2000-2026 MajorGeeks.com
Powered by Contentteller® Business Edition