ObliqueRAT Trojan Lurks On Compromised Websites – Experts Comments

Free Services to help you during COVID-19 Learn More

Support Request a Demo Contact Us Blog
Business Data Breach

Expert(s): Saryu Nayyar | Informationsecuritybuzz.com » 

In a blog post-Tuesday, Cisco Talos reports a new campaign has changed how the malware is served on victim systems. Experts offer perspective.

EXPERTS COMMENTS
Saryu Nayyar

| March 03, 2021

Saryu Nayyar, CEO, Gurucul

The evolution of the ObliqueRAT trojan is a good example of how malicious actors are constantly updating their tools and techniques.

The evolution of the ObliqueRAT trojan is a good example of how malicious actors are constantly updating their tools and techniques to bypass existing controls. By embedding their malware in a bitmap image using steganography, they are able to bypass conventional controls that block executables, archives, etc. By embedding it in an image, they also slip past the Human element that would only see an image as expected. Fortunately, the attackers can’t hide the malware’s behaviors, which means security analytics remains effective, while knowing the sources and file format makes it easy to add restrictions through threat intelligence feeds as well.

ObliqueRAT Trojan
External Link: ObliqueRAT Trojan Lurks On Compromised Websites – Experts Comments

Share this page:

Related Posts