Microsoft has recently discovered a new remote access trojan (RAT) known as StilachiRAT, which utilizes advanced techniques to evade detection, maintain persistence, and exfiltrate sensitive data. Although this malware is not yet widely distributed, Microsoft has chosen to publicly release indicators of compromise (IOCs) and provide mitigation advice to assist network defenders in identifying and reducing the threat’s impact. As of now, StilachiRAT has only been seen in a few isolated incidents, and Microsoft has not been able to link it to a specific threat actor or geographic region. The RAT has a variety of capabilities, including stealing sensitive information from compromised systems such as credentials saved in browsers, digital wallet details, clipboard contents, and system data. The malware is specifically designed to target cryptocurrency wallets, extracting data from the configuration information of 20 popular crypto wallet extensions, such as Coinbase Wallet, Metamask, and Trust Wallet. It also scans for and steals credentials stored in the Google Chrome local state file and monitors the clipboard for sensitive information like passwords and cryptocurrency keys. StilachiRAT maintains its persistence by leveraging the Windows service control manager (SCM) and automatically reinstalls itself if removed. It can also monitor active Remote Desktop Protocol (RDP) sessions, enabling attackers to impersonate logged-in users and move laterally within networks. Furthermore, it is equipped with anti-forensics measures, such as the ability to clear event logs and detect sandbox environments, making it harder for security professionals to analyze. Additionally, StilachiRAT allows attackers to execute commands remotely, including manipulating system windows, rebooting the system, and modifying registry values.
An upcoming bug bounty report identified a browser specific reflected Cross Site Scripting XSS bug on the help ads target com domain. The bug enabled malicious JavaScript to run in...
Panama's Ministry of Economy and Finance (MEF) corroborated a cybersecurity attack with possible ransomware, after the INC Ransom gang made the claim. MEF identified malicious ...
ESET Research has identified a new and highly advanced ransomware strain dubbed *HybridPetya*, discovered through the VirusTotal sample sharing platform. This variant is a modern e...