New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers: https://t.co/Ch8A88HFdm by The Hacker News #infosec #cybersecurity #technology #news
🧬 New Malware Alert: Hides Using Broken File Headers! Fortinet just uncovered a remote access trojan (RAT) that ran unnoticed for weeks—using corrupted DOS & PE headers to avoid detection. 🖥️ Turns your PC into a remote access hub 🔁 Supports multiple attacker sessions 🔐 Uses https://t.co/ItxAM7iot9
Malware Analysis Reveals Sophisticated RAT With Corrupted Headers https://t.co/a90UX9yNAt
Cybersecurity researchers have identified a new wave of sophisticated malware campaigns targeting users through deceptive methods. A fake antivirus website has been used to distribute the Venom Remote Access Trojan (RAT) alongside other malware strains. This RAT employs corrupted DOS and PE file headers to evade detection, allowing it to operate unnoticed for weeks. Fortinet and other security analysts have highlighted that this malware can convert infected PCs into remote access hubs supporting multiple attacker sessions. Additionally, attackers have shifted tactics from traditional password theft to session hijacking, enabling them to gain live access to platforms such as Microsoft 365, AWS, and Slack without needing passwords or multi-factor authentication. Analysis of over 20 million stealer logs by Flare reveals the rapid pace and evolving nature of these attacks, underscoring the need for enhanced cybersecurity measures to counter these emerging threats.