Gophish Framework Exploited in Phishing Campaigns to Deploy DCRat and PowerRAT
A new phishing campaign has been uncovered targeting Russian-speaking users, leveraging the Gophish framework to deliver two remote access trojans (RATs)—DarkCrystal RAT (DCRat) and a newly identified malware, PowerRAT. The campaign exploits phishing emails, malicious documents, and HTML pages to initiate infection chains, resulting in system compromise and data exfiltration.
- Gophish framework: Open-source phishing toolkit used for launching email campaigns, here repurposed by threat actors for malicious attacks.
- Target Audience: Primarily Russian-speaking users, with phishing content disguised as links to Yandex Disk and VK social networks.
- Infection Methods: Attack chains include malicious Microsoft Word documents or HTML files embedded with JavaScript to execute DCRat or PowerRAT payloads.
- PowerRAT functionality: Performs system reconnaissance, collects data, and executes PowerShell scripts based on instructions from the Command and Control (C2) server.
- DCRat capabilities: Modular RAT with the ability to steal sensitive data, capture keystrokes, and provide remote access to compromised machines.
- Persistence Mechanism: Both RATs establish persistence through Windows tasks and C2 server communication.
- Recent Trends: Threat actors are increasingly embedding malicious payloads within virtual hard disk (VHD) files to evade detection by email security systems.
The use of open-source tools like Gophish in sophisticated phishing campaigns underscores the evolving tactics threat actors are adopting to compromise systems. By deploying Remote Access Trojans such as DCRat and PowerRAT, cybercriminals can gain unauthorized access to sensitive data and further infiltrate networks. It's crucial for organizations and individuals to remain vigilant by implementing strong email security practices, regularly updating software, and educating users on how to identify and avoid phishing attacks to mitigate the risk of malware infections.
- Other (42)
- Ransomware (128)
- Events and News (26)
- Features (45)
- Security (433)
- Tips (79)
- Google (22)
- Achievements (9)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (195)
- Cyber Attack (221)
- Data Backup (11)
- Data Breach (80)
- Phishing (139)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (56)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (7)
- vulnerability (54)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (7)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)