Home Malware Programs Remote Administration Tools HorusEyes RAT

HorusEyes RAT

Posted: February 9, 2021

Malware developers often publish their projects online nonchalantly. A recent malware project that fits this profile was discovered just a few days ago, and its author calls it the HorusEyes RAT. So far, the HorusEyes RAT has not been involved in any large-scale attack campaigns, but it is likely to be a matter of time for cybercriminals to adopt this malware project. It is important to note that the author has published the full source code, which means that knowledgeable cybercriminals may opt to expand HorusEyes RAT's features and make various improvements.

The author of the HorusEyes RAT has listed some of the core features of this Remote Access Trojan (RAT,) and, fortunately, it seems to lack some of the core features typical for this malware. It can still:

  • Hide and show Windows components like icons, taskbar, desktop and more.
  • Disable the keyboard/mouse.
  • Collect data from Web browsers – history, stored passwords and more.
  • Manage running processes.
  • Restart or shut down the computer.
  • Manage volume.
  • Try to bypass User Account Control (UAC.)
  • Use the Task Scheduler to create scheduled tasks.

Thankfully, HorusEyes RAT's operators will be unable to manage the file system or plant additional malware. Regardless of this, a potential HorusEyes RAT infection can be very threatening, and you should take the required measures to prevent such attacks. The best way to keep your computer safe is to use an up-to-date anti-malware software suite at all times.

Loading...