Home Malware Programs Trojans RevengeRAT

RevengeRAT

Posted: April 18, 2019

RevengeRAT or Revetrat is a Remote Access Trojan that gives remote attackers significant control over your system. These features include access to your files, settings, information and connected devices. Since it's a high-level and stealth-focused threat, users never should try removing the RevengeRAT manually, and, instead, use dedicated anti-malware services for disinfection.

A Trojan Hijacks the Public Good for Private Gain

Threats using public services for unwanted purposes is an occasional element in some of the more in-depth Trojan attacks. While this model gives up some degree of control over to third parties that may not have any interest in cooperating with the threat actor's plans, it provides significant benefits, too. The RevengeRAT is a showing of just what one Trojan can do with a company's pre-made sites and services.

RevengeRAT is a Remote Access Trojan – or a tool that provides a backdoor into the system with invasive UI accessibility options. In most cases, these features include information-spying and collecting ones, and RevengeRAT continues on this point by giving attackers access to your webcam, a keylogging feature for recording your typing, and a password-harvesting system. Malware researchers also confirm some of its control-oriented elements, such as changing the Registry, modifying files, opening or closing memory processes, and even changing the Hosts file – which opens up possibilities of hijacking the victim's Web browser.

Besides its significant but not unusual level of risk as a RAT, RevengeRAT's recent campaigns avoid identification from security solutions through the choices of servers for the installation. Instead of using privately-owned sites, the threat actors coordinate attacks through a selection Pastebin text storage, blogs from BlogSpot, and shortened links from Bit.ly. The consistent use of reputable domains, along with some anti-security measures, improve the chances of a RevengeRAT's installation without the relevant security solutions getting in the way.

Spoiling the Cold-Served Dish

Its threat actors put a great deal of thought into RevengeRAT's infrastructure and delivery mechanisms but remain shackled to some inherent technical limitations. Current RevengeRAT attacks require the victim's opening a corrupted e-mail attachment and enabled additional content, which triggers the software vulnerability. This attack includes both the dropping of RevengeRAT and the disabling of security services like Windows Defender.

Users who don't scan their downloads from sources like strange e-mail messages are at more risk from RevengeRAT's latest strategies. Updating document reader software will cull many vulnerabilities, if not all of them, from corrupted content, and most modern versions of Word should have macros turned off, by default. Anti-malware products should remain effective at deleting RevengeRAT upfront or uninstalling it after the installation.

RevengeRAT is a rodent with a lot to offer to criminals and does so with a deft abuse of free website features. When Trojans go the extra mile at hiding, it only shows the pricelessness in catching them before their exploit-riding antics get started.

Loading...