![]() ![]() There are typically numerous, unrelated attackers attempting to leverage this RAT to compromise corporate networks for the purposes of establishing an initial point of network access, the performance of lateral movement, as well as to exfiltrate sensitive information that can be monetized. ![]() The source code associated with RevengeRAT was previously released to the public, allowing attackers to leverage it for their own malicious purposes. ![]() Since its emergence in 2016, various adversaries used RevengeRAT to attack organizations and individuals around the world. ![]() By Edmund Brumaghin and Holger Unterbrink.Įxecutive summary Orcus RAT and RevengeRAT are two of the most popular remote access trojans (RATs) in use across the threat landscape.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |