Breaking News

•••  All important news related to new attacks and see the solutions we can offer you  •••


T-RAT 2.0 Telegram-controlled RAT, a new security threat

Lees het originele artikel hier
Cyber Defense

T-RAT 2.0 is a Trojan being advertised and sold on Russian forums, according to a posting on the G DATA Security Blog.
The most notable feature of T-RAT 2.0 is that it can be controlled using the Telegram app.


Apparently, here’s what T-RAT 2.0 can do to your system, once it infects it:

  • Retrieve cookies and passwords from your browser
  • Grant the attacker full access to your file system
  • Perform audio recordings (requires an audio input device such as a microphone)
  • Log your keystrokes
  • Disable your Taskbar
  • Use your webcam to perform video recordings or take pictures
  • Fetch clipboard content
  • Snap screenshots of your current view
  • Disable your Task Manager
  • Hijack transactions for several services, including Ripple, Dogecoin, Qiwi, and Yandex.Money
  • Execute CMD & PowerShell commands
  • Restrict your access to various websites and services
  • Forcefully terminate processes on your computer
  • Use RDP and/or VNC to perform additional remote control operations


More so, it’s compatible with most Chromium-based browsers (v80 and up), and its Stealer component supports the following apps:

  • Steam
  • Telegram
  • Skype
  • Viber
  • FileZilla XML
  • NordVPN
  • Discord



Contact us for a test with Cymulate Breach and Attack Simulation

British Airways fined £20m for Magecart hack that exposed 400k folks' credit card details to crooks

Lees het originele artikel hier
Cyber Defense

British Airways is to pay a £20m data protection fine after its 2018 Magecart hack – even though the Information Commissioner’s Office discovered the airline had been saving credit card details in plain text since 2015.

The fine, announced this morning by the UK's data watchdog, is almost exactly at the reduced £19.8m level that BA parent company the International Airlines Group had expected back in August.

Read about Reflectiz, and how it can protect your organization and your clients against magecart

GravityRAT Comes Back to Earth

Lees het originele artikel hier
Cyber Defense

The espionage tool masquerades as legitimate applications and robs victims blind of their data.

Kaspersky researchers spotted updated GravityRAT code indicating an overhaul of the the malware.
"Further investigation confirmed that the group behind the [GravityRAT] malware had invested effort into making it into a multiplatform tool...the campaign is still active," according to Kaspersky.

The malware is capable of retrieving device data, contact lists, email addresses, call logs and SMS messages and can exfiltrate various types of documents and files.

Contact us for a test with Cymulate Breach and Attack Simulation
Load more