Netcrook Logo

Tag: Remote Access Trojan

72 article(s)

Phantom Extensions: GlassWorm’s Attack on Developer IDEs via OpenVSX

10 Apr 2026 news

GlassWorm’s latest campaign weaponizes a trusted OpenVSX extension to deliver a persistent RAT, targeting developers using VS Code, Cursor, Windsurf, and more. Here’s how the attack unfolds—and what you need to know to stay safe.

#GlassWorm | #Remote Access Trojan | #OpenVSX

Behind the CAPTCHA: ClickFix Malware Uses Node.js, Tor to Steal Cryptocurrency

08 Apr 2026 news

A new ClickFix malware campaign exploits fake CAPTCHAs and Node.js RATs delivered over Tor to steal cryptocurrency, using a professional Malware-as-a-Service model targeting Windows users.

#ClickFix | #Remote Access Trojan | #Malware

Fake Installers Turn Computers into Monero Mining Machines: Inside the REF1695 Malware Campaign

07 Apr 2026 news

A new wave of cybercrime uses fake software installers to infect computers with RATs and Monero miners, stealing resources and cashing in through stealthy tactics. REF1695’s campaign reveals the modern face of persistent, low-profile malware.

#Cybercrime | #Monero mining | #Remote Access Trojan

Inside the Axios Breach: Social Engineering Goes Industrial

06 Apr 2026 news 🌍 Asia

The Axios breach shows how social engineering attacks have scaled up, targeting open source maintainers and exposing millions to risk. This feature investigates the industrialization of these attacks and the urgent need for new defenses.

#Axios breach | #Social engineering | #Remote Access Trojan

Telegram Turned Trojan: ResokerRAT Malware Uses Messaging App to Hijack Windows PCs

06 Apr 2026 news

A new cyber threat, ResokerRAT, turns Telegram’s trusted messaging platform into a covert command center for hijacking Windows PCs. Learn how this malware evades detection and what it means for the future of digital security.

#Telegram | #Cybercrime | #Remote Access Trojan

Hijacked Axios npm Package Unleashes Phantom Malware in Supply Chain Attack

06 Apr 2026 news

Attackers hijacked Axios’s npm account to publish malware-laden packages using a phantom dependency, exposing thousands of systems to a sophisticated remote access trojan. Discover how the breach happened, the technical details, and essential mitigation steps.

#Axios | #Phantom Dependency | #Remote Access Trojan

Hackers Impersonate CERT-UA in GoRAT Attack: Cyber Sickle Strikes

03 Apr 2026 news 🌍 Europe

A brazen phishing campaign saw attackers impersonate CERT-UA and distribute a powerful Go-based RAT, AGEWHEEZE. With a Telegram confession and advanced persistence tricks, the CYBER SICKLE group demonstrates the evolving tactics of modern cybercrime.

#Cybersecurity | #Phishing | #Remote Access Trojan

Fake CERT-UA Website Unleashes Go-Based RAT in Phishing Blitz

02 Apr 2026 news 🌍 Europe

Cybercriminals cloned Ukraine's cyber defense website to launch a phishing campaign distributing the powerful AGEWHEEZE RAT. The attack, claimed by 'Cyber Serp,' highlights rising threats and the importance of constant vigilance.

#Cybersecurity | #Phishing | #Remote Access Trojan

Axios npm Breach: Anatomy of a Massive Supply Chain Attack

01 Apr 2026 news

Axios, a core npm package with over 100 million weekly downloads, was hijacked in a sophisticated supply chain attack. Hackers used stolen credentials to publish malicious versions, delivering a stealthy RAT to developers' machines. The breach highlights the vulnerabilities of open-source ecosystems and the urgent need for robust security practices.

#Axios | #npm attack | #Remote Access Trojan

Axios npm Breach: How Hackers Hijacked a Trusted Package to Spread Cross-Platform Malware

01 Apr 2026 news 🌍 Asia

A sophisticated supply chain attack on the Axios npm package leveraged a compromised maintainer account to distribute cross-platform malware, exposing developer environments worldwide. Security experts warn this incident marks a new era of precision and stealth in open source threats.

#Axios hack | #supply chain attack | #Remote Access Trojan