A sophisticated remote access trojan (RAT) dubbed Xeno RAT has surfaced on GitHub, presenting a significant threat as it is freely accessible to malicious actors. Developed in C#, the RAT is compatible with Windows 10 and Windows 11, offering an extensive range of features for managing systems remotely. These include a SOCKS5 reverse proxy, real-time audio recording, and a hidden virtual network computing (hVNC) module akin to DarkVNC, allowing attackers to gain unauthorized access to compromised machines. The developer, known as moom825, emphasizes that Xeno RAT is entirely original, ensuring a unique approach to remote access tools. Notably, the RAT also features a builder that enables the customization of malware variants. moom825 is also the creator of another C#-based RAT named DiscordRAT 2.0, which has been distributed by threat actors in a malicious npm package named node-hide-console-windows, as reported by ReversingLabs in October 2023. Recently, cybersecurity firm Cyfirma reported instances of Xeno RAT being disseminated through the Discord content delivery network (CDN), highlighting the increasing trend of affordable and readily available malware driving RAT-based campaigns. Cyfirma detailed the primary attack vector, which involves a shortcut file disguised as a WhatsApp screenshot that acts as a downloader. This downloader fetches a ZIP archive from Discord CDN, extracts it, and executes the next stage payload. This multi-stage process utilizes DLL side-loading to load a malicious DLL, ensuring persistence and evading analysis and detection. In a related development, the AhnLab Security Intelligence Center (ASEC) uncovered the use of a Gh0st RAT variant called Nood RAT in attacks targeting Linux systems. Nood RAT functions as a backdoor, allowing threat actors to remotely control compromised systems, download malicious files, steal internal files, and execute commands. Despite its simple appearance, Nood RAT features encryption to evade network packet detection and can execute various malicious activities based on commands received from threat actors.
A critical vulnerability in F5 BIG-IP Access Policy Manager (APM) is being actively exploited, with over 14,000 exposed instances identified by Shadowserver. Initially classified a...
Cisco has issued a high-priority security alert concerning a critical flaw in its Smart Software Manager On-Prem (SSM On-Prem) platform, identified as CVE-2026-20160. The vulnerabi...
Modern fraud operations are evolving beyond traditional cyberattacks by leveraging legitimate services and physical-world infrastructure to execute highly effective schemes. Instea...