Skip to content

A ‘Triple Ransomware’ threat is here

Advantage Aware

A new type of ‘Remote Access Trojan’ (RAT) has been released and is being used to spread ‘Distributed Denial of Service’ (DDoS) and ransomware attacks. Dubbed the ‘Borat RAT’, it comprises of ransomware, spyware, and RAT.

With hidden VNC abilities, vast surveillance features, microphone and video capture capabilities and file exfiltration toolkits, the Borat RAT is extremely sophisticated, empowering an attacker with abilities to cause a system-wide disruption. Threat intelligence company, Cyble, investigated this threat. In their deep dive, they found alarming ‘features’ of the Borat RAT.

Annoyance capabilities are also included, such as changing keyboard keys, switching monitors, and changing ‘mouse click’ settings. Chrome browsers appear to be the most impacted and is readily available on the dark net.

The FBI recently released the 2021 Internet Crime Report which indicated cybercrime losses of almost 7 billion USD in 2021. The report states that the evolution of tactics and techniques demonstrates threat actors’ increasing technological sophistication.

What can we do?

  • Be wary of links within emails
  • Use strong passwords with MFA
  • Conduct regular backups
  • Use a well reputed anti-virus

More advanced defence strategies include:

  • Endpoint security
  • The ability to micro-segment if an endpoint has been compromised
  • Employing operational intelligence within your IDS/IPS
  • Real-time logging analysis with machine learning
  • A SOC team that can initiate action-based response

Defence-in-depth, firewall and antivirus may provide some protection against attacks, but an adaptive defence approach is the best strategy. Risk mitigation resources are expensive, time consuming, and present unrealistic technical requirements to many businesses. A Managed Security Service Provider (MSSP) can offer solutions that meet defence requirement requiring a reasonable budget.

An MSSP will be expected to provide all the defence strategies listed above, along with advice and help with implementation. Options could include cloud backup, 24/7 SOC availability with real-time monitoring, end-point security, zero trust architecture, tailored support solutions, access to global and local threat intelligence feeds, micro-segmentation tools and provide skilled dedicated security advisors.

Are you ready to take charge?  

Dr Antony
PhD, MISDF (1st Class), MBA
Senior Cyber Security Engineer
Advantage https://advantage.nz

Facebook
Twitter
LinkedIn

Related Posts

Secure, optimized work from anywhere is already recognized as a necessity and a primary business opportunity for all IT teams. SSE successfully enables this by converging Web Proxy (SWG), ZTNA, CASB, and DLP into one, powerful, high-performing solution.
Overland’s security is up against the unique challenges of a retail environment. Anyone can walk up to a point-of-sale system and try to gain access when no one’s looking, a problem that’s amplified when staff share passwords to serve customers quickly.
Something interesting caught my eye, and it is the intersection between misinformation, disinformation, and cyber security and the World Economic Forum’s perceived level of the threat we all face.