RAT Upgrade Targets Governments

Tuesday, July 9, 2013 @ 04:07 PM gHale


A spear phishing campaign focused on government agencies in the U.S., Canada, Australia, a few European countries and the Russian Federation is much simpler than other attacks, but it is a big upgrade.

The attackers appear to be taking advantage of the controversial political topic, the PRISM data harvesting program, to deliver emails that supposedly contain documents on the subject, said researchers at Symantec.

RELATED STORIES
Middle East Espionage Malware is a RAT
U.S. Disinformation Plan for China
Utility Blackouts as a Weapon
Synching Up a Reliable Power Grid

The PDFs are innocuous, but the .jar file is not. It is a Java RAT called jRat, and it gives the attackers full and complete access to and control over the victim’s computer.

In theory, it doesn’t matter which OS the computer runs; all it takes is a Java installation and it will end up compromised.

“The RAT can target not only Windows, but also Linux, Mac OS X, FreeBSD, OpenBSD, and Solaris (although we have not verified or observed the threat working on all of these operating systems),” the researchers said. “The threat has a builder tool that allows you to build your own customized versions of the RAT.”

By comparing the C&C server used in this current campaign to the list of those used in previous ones, they also concluded the same attackers have previously opted for more complex attacks.

“The attack has been simplified as it does not involve the use of an exploit, nor an executable shellcode/payload, but simply relies on a Java applet,” they said.

“Nonetheless, it is no less dangerous than the older attacks and it can spread more easily since exploits are usually limited to work on specific versions of the vulnerable software and operating system, while this RAT can spread on any system where Java runtime is installed. In fact, not only has the attack been simplified, but it has also become more stable and more virulent, it is a big upgrade.”



Leave a Reply

You must be logged in to post a comment.