Get a Pentest and security assessment of your IT network.

Cyber Security

Terminator RAT became more sophisticated in recent APT attacks

A word document as an attachment was sent to victims, exploited vulnerability in Microsoft Office (CVE-2012-0158), which subsequently drops a malware installer named “”. Sometimes the simplest techniques can foil complex systems created by security firms and large enterprises to detect malicious programs and files. The malware will only run after reboot. This is one effective way to evade sandbox automatic analysis, as malicious activity will only reveal after a reboot. The RAT (svchost_.exe) will collaborate with its relay (sss.exe) to communicate with the command and control server at liumingzhen.zapto.org / 123.51.208.

Source: https://thehackernews.com/2013/10/terminator-rat-became-more.html

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security