Press ESC to close

Horns&Hooves campaign delivers NetSupport RAT and BurnsRAT

 

CategoryDetails
Threat ActorsUnknown, targeting private users, retailers, and service businesses.
Campaign OverviewMalicious email campaign distributing JS/HTA scripts. Began in March 2023, targeting Russian entities.
Target Regions (Or Victims)Primarily Russia (private users, retailers, and service businesses).
MethodologyMalicious email attachments (ZIPs) containing JS scripts, disguised as business documents.
Product TargetedNetSupport Manager (NSM), used for remote access and management.
Malware ReferenceNetSupport RAT, Silverlight-based payload.
Tools UsedJS/HTA scripts, curl, bitsadmin, BAT files, NetSupport Manager, RMS, Silverlight Configuration Utility.
Vulnerabilities ExploitedExploits for loading remote payloads via social engineering (email attachments, fake documents).
TTPsPhishing, use of decoy documents, remote access tools (NetSupport RAT, Silverlight DLL side-loading).
AttributionAttribution unclear, suspected cybercriminals using social engineering techniques.
RecommendationsBe cautious of unsolicited emails with attachments, especially ZIP files. Use security software to detect remote access tools.
SourceSecurelist by Kaspersky

Read full article:https://securelist.com/horns-n-hooves-campaign-delivering-netsupport-rat/114740/

Disclaimer: The above summary has been generated by an AI language model

Source: Securelist by Kaspersky

Published on: December 2, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *