Press ESC to close

Threat Actor Abuses Gophish to Deliver New PowerRAT and DCRAT

CategoryDetails
Threat ActorsUnknown Threat actor using Open-Source Gophish Toolkit
Campaign OverviewPhishing campaign using modular infection chains (Maldoc or HTML-based). Targets Russian-speaking users with PowerRAT and DCRAT payloads.
Target Regions (Victims)Russian-speaking users in Russia, Ukraine, Belarus, Kazakhstan, Uzbekistan, and Azerbaijan.
MethodologyPhishing emails with embedded malicious Word documents or HTML files containing JavaScript. Requires user intervention to activate infections.
Product TargetedMicrosoft Word (for Maldoc-based infection).
Malware ReferencePowerRAT (new PowerShell RAT), DCRAT (Remote Access Tool).
Tools UsedGophish (phishing toolkit), PowerShell (for scripting), cscript.exe (used to run JavaScript).
Vulnerabilities ExploitedAbuse of Windows NT registry (LOAD key) to auto-run malicious scripts upon user login.
TTPsPhishing, social engineering (luring through fake VK page), malicious macros, use of PowerShell for in-memory execution, base64 encoding for hiding payloads.
AttributionUnspecified (no clear attribution to a specific actor, but campaign targets Russian-speaking regions).
RecommendationsEmploy security awareness training, use advanced email filtering, monitor for abnormal registry changes, implement endpoint detection and response (EDR) solutions.
SourceCisco Talos Blog

Read full article: https://blog.talosintelligence.com/gophish-powerrat-dcrat/

The above summary has been generated by an AI language model

Leave a Reply

Your email address will not be published. Required fields are marked *