This dangerous malware affects nearly all devices, and somehow remained undetected until now
Cybersecurity researchers have uncovered a Remote Access Trojan (RAT), that’s been flying under antivirus programs’ radars for at least half a year and targeting, at least, education institutions.
As reported by Ars Technica, the RAT’s been dubbed SysJoker by researchers from Intezer who discovered it. When they first discovered it, on a Linux-based Webserver belonging to a “leading educational institution”, they learned it was written from scratch.
They don’t know who built it, when they built it, or how they distribute it. Their best guess is that it was built in the second half of last year, by an advanced threat actor with “significant resources”. They came to this conclusion knowing the fact that fully cross-platform malware, with four separate C2 servers, are a rare sight.
Removing SysJoker
As for the distribution, they speculate that the educational institution in question installed it on its endpoint through a malicious npm package. They are confident the attackers did not exploit any flaws in the target’s systems, but rather tricked somebody into installing it. There’s a good chance the attackers aren’t casting a wide net, but are rather engaged in “ espionage together with lateral movement which might also lead to a ransomware attack as one of the next stages,” against specific targets.
The malware is written in C++, and is yet to be added to the VirusTotal malware search engine. It also seems to be quite potent, as it can create files, add registry commands, install further malware, run commands on the infected device, or even shut itself off.
As the RAT is yet to be added to the virus database, system administrators who discover the infection need to remove the malware manually. According to iTechPost, that’s a three-step process: 1) eliminate the malware’s persistence mechanism, manually delete all the affected files and kill all the malware-related programs; 2) run a memory scanner to ensure all malicious files have been removed; 3) check if all software tools are updated, tighten up firewall settings, and investigate possible access points.
Via: Ars Technica
Audio player loading… Cybersecurity researchers have uncovered a Remote Access Trojan (RAT), that’s been flying under antivirus programs’ radars for at least half a year and targeting, at least, education institutions. As reported by Ars Technica, the RAT’s been dubbed SysJoker by researchers from Intezer who discovered it. When they…
Recent Posts
- Quordle today – hints and answers for Friday, May 3 (game #830)
- NYT Strands today — hints, answers and spangram for Friday, May 3 (game #61)
- Microsoft says it did a lot for responsible AI in inaugural transparency report
- Samsung’s best customization app for Galaxy phones is now on Google Play
- Want to Buy a Decommissioned Supercomputer? Here’s Your Chance
Archives
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- December 2011