Chapter
Different kinds of malware and remote control capabilities discovered by cyber researchers
Researchers found new types of malware and remote control capabilities being used by hackers. The malware exfiltrated data through Dropbox and had remote access capabilities, with hackers able to control the infected computer remotely.
Clips
Malicious emails with an attachment ending in ".RAT" are being sent to government officials in Saudi Arabia.
33:24 - 36:11 (02:47)
Summary
Malicious emails with an attachment ending in ".RAT" are being sent to government officials in Saudi Arabia. This attachment contains a fully functional malware that can give the attacker full access to the victim's computer and steal sensitive information.
ChapterDifferent kinds of malware and remote control capabilities discovered by cyber researchers
Episode89: Cybereason - Molerats in the Cloud
PodcastDarknet Diaries
Researchers have identified a new piece of malware that was used in a cyber attack campaign targeting the Middle East.
36:11 - 39:29 (03:18)
Summary
Researchers have identified a new piece of malware that was used in a cyber attack campaign targeting the Middle East. The malware was found to be involved in phishing attempts and communication with hackers.
ChapterDifferent kinds of malware and remote control capabilities discovered by cyber researchers
Episode89: Cybereason - Molerats in the Cloud
PodcastDarknet Diaries
The hackers were able to control a backdoor virus remotely, and exfiltrate data through Dropbox.
39:29 - 43:43 (04:14)
Summary
The hackers were able to control a backdoor virus remotely, and exfiltrate data through Dropbox. The access gave the hacker remote backdoor access to the computer and could be done through secret and elaborate servers.