Malware Named NiceRAT Focuses on South Korean Users via Pirated Software

June 17, 2024Press RoomBotnet / Virtual Currency

Cyber criminals have been seen utilizing an insidious software known as NiceRAT to hijack infected devices into a botnet.

NiceRAT Malware Targets South Korean Users via Cracked Software

June 17, 2024Press RoomBotnet / Virtual Currency

NiceRAT Malware Targets South Korean Users via Cracked Software

Cyber criminals have been seen utilizing an insidious software known as NiceRAT to hijack infected devices into a botnet.

The assaults, directed at South Korean users, are crafted to spread the malware disguised as pirated programs, like Microsoft Windows, or utilities claiming to offer license confirmation for Microsoft Office.

“Due to the nature of pirated software, information exchange among regular users aids in the dissemination of malware independently from the original distributor,” according to the AhnLab Security Intelligence Center (ASEC) stated.

“As threat actors usually provide instructions to eliminate anti-malware programs during the distribution phase, detecting the disseminated malware becomes challenging.”

Alternate methods of distribution include utilizing a botnet comprising zombie machines infiltrated by a remote access trojan (RAT) known as NanoCore RAT, resembling previous actions that leveraged the Nitol DDoS malware to spread another malware called Amadey Bot.

Cybersecurity

NiceRAT is an actively designed open-source RAT and stealer malware coded in Python that employs a Discord Webhook for command-and-control (C2), enabling threat actors to extract sensitive data from the compromised system.

Initially launched on April 17, 2024, the present version of the software is 1.1.0. It’s also accessible as a premium release, as per its creator, indicating that it’s promoted using the malware-as-a-service (MaaS) concept.

This development occurs amidst the resurgence of a digital currency mining botnet referred to as Bondnet, which has been utilizing high-performance miner bots as C2 servers since 2023 by configuring a reverse proxy using an altered version of a legitimate tool known as Fast Reverse Proxy (FRP).

Enjoyed this piece? Follow us on Twitter and LinkedIn to access additional exclusive content.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.