Netcrook Logo

Tag: Remote Access Trojan

66 article(s)

Hackers Weaponize Obsidian Plugins for Stealthy Cross-Platform Attacks

14 Apr 2026 news

Attackers abused Obsidian’s plugin sync and cloud vaults to deliver PHANTOMPULSE malware, targeting financial and crypto professionals. The campaign leveraged social engineering and technical stealth to bypass traditional security measures.

#Obsidian | #Remote Access Trojan | #Cyberattack

CPUID Breach: Trojanized CPU-Z and HWMonitor Downloads Fuel Global Malware Attack

13 Apr 2026 news

A brief but devastating compromise of CPUID’s website allowed attackers to distribute trojanized versions of CPU-Z and HWMonitor, infecting hundreds worldwide with the powerful STX RAT malware.

#Supply Chain Attack | #Remote Access Trojan | #Trojanized Software

CPUID Download Hack: Malware Delivered via CPU-Z and HWMonitor

13 Apr 2026 news 🌍 Asia

For six hours, the trusted CPUID website served malware-laced versions of CPU-Z and HWMonitor, exposing users to a sophisticated remote access trojan. Here’s how the attack unfolded—and what it means for software trust.

#Malware Attack | #Supply Chain | #Remote Access Trojan

Lazarus Group Registers Real US LLCs to Spread Malware in Blockchain Scam

10 Apr 2026 news 🌍 Asia

North Korea-linked hackers are now registering real US companies to lure blockchain developers into downloading malware. The graphalgo campaign shows how cybercriminals are blending legal paperwork with technical trickery, making vigilance essential for all developers.

#Lazarus Group | #Blockchain Scam | #Remote Access Trojan

Phantom Extensions: GlassWorm’s Attack on Developer IDEs via OpenVSX

10 Apr 2026 news

GlassWorm’s latest campaign weaponizes a trusted OpenVSX extension to deliver a persistent RAT, targeting developers using VS Code, Cursor, Windsurf, and more. Here’s how the attack unfolds—and what you need to know to stay safe.

#GlassWorm | #Remote Access Trojan | #OpenVSX

Behind the CAPTCHA: ClickFix Malware Uses Node.js, Tor to Steal Cryptocurrency

08 Apr 2026 news

A new ClickFix malware campaign exploits fake CAPTCHAs and Node.js RATs delivered over Tor to steal cryptocurrency, using a professional Malware-as-a-Service model targeting Windows users.

#ClickFix | #Remote Access Trojan | #Malware

Fake Installers Turn Computers into Monero Mining Machines: Inside the REF1695 Malware Campaign

07 Apr 2026 news

A new wave of cybercrime uses fake software installers to infect computers with RATs and Monero miners, stealing resources and cashing in through stealthy tactics. REF1695’s campaign reveals the modern face of persistent, low-profile malware.

#Cybercrime | #Monero mining | #Remote Access Trojan

Inside the Axios Breach: Social Engineering Goes Industrial

06 Apr 2026 news 🌍 Asia

The Axios breach shows how social engineering attacks have scaled up, targeting open source maintainers and exposing millions to risk. This feature investigates the industrialization of these attacks and the urgent need for new defenses.

#Axios breach | #Social engineering | #Remote Access Trojan

Telegram Turned Trojan: ResokerRAT Malware Uses Messaging App to Hijack Windows PCs

06 Apr 2026 news

A new cyber threat, ResokerRAT, turns Telegram’s trusted messaging platform into a covert command center for hijacking Windows PCs. Learn how this malware evades detection and what it means for the future of digital security.

#Telegram | #Cybercrime | #Remote Access Trojan

Hijacked Axios npm Package Unleashes Phantom Malware in Supply Chain Attack

06 Apr 2026 news

Attackers hijacked Axios’s npm account to publish malware-laden packages using a phantom dependency, exposing thousands of systems to a sophisticated remote access trojan. Discover how the breach happened, the technical details, and essential mitigation steps.

#Axios | #Phantom Dependency | #Remote Access Trojan