A versatile Java-based RAT that is capable of keylogging and credential theft from browsers and email clients emerged in 2020 that is dubbed “STRRAT.”
The most recent updated version of STRRAT evolved dramatically, and since its discovery, it has been observed that it now does the following things:-
A new technique that involves two string obfuscation methods has been recently identified by the cybersecurity researchers at Cyble Research And Intelligence Labs (CRIL) to distribute STRRAT (version 1.6).
With a spam email posing as an electronic company, the infection chain begins, and here the email includes a PDF invoice attachment sent to the target.
When the attached PDF is opened it displays a download image that prompts the user to click on it, which initiates the download of “Invo-0728403.zip” from the following URL:-
Downloaded Zip holds encrypted STRRAT payload in JavaScript. Upon execution, JS decrypts the payload, placing “lypbtrtr.txt” in the following directory:-
File type check reveals a disguised JAR (zip) file that extracts the “carLambo” folder and META-INF with classes, resources, and MANIFEST.MF which ensures it is “STRRAT malware.
The analysis of the latest variant of STRRAT malware shows class name modifications and two string obfuscators (Allatori, ZKM) used, unlike the prior version that used only “Allatori.”
Since March 2023, the STRRAT malware (version 1.6) is actively distributed through multiple infection chains, and not only that in the wild more than 70 samples were detected.
For persistence, it sets the “Skype” task scheduler entry, and STRRAT 1.6 stores C&C server info in an encrypted Base64-encoded config.txt file with AES encryption, as in previous versions.
Here below we have mentioned the browsers that are targeted:-
Here below we have mentioned the email clients that are targeted:-
Here below we have mentioned all the recommendations that are offered by the security analysts:-
A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious actors…
SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce shoppers…
The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to malicious…
Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in 2022…
CVE-2024-52301 is a critical vulnerability identified in Laravel, a widely used PHP framework for building…
A critical vulnerability has been discovered in the popular "Really Simple Security" WordPress plugin, formerly…