• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Whitepapers
  • SMB Spotlight
  • Newsletters
  • Sign in
  • Events
    • Upcoming events
      event logo
      Big Data Virtual Summit

      The Big Data Virtual Summit will comprise expert keynotes, real world case studies and interactive discussion panels led by senior IT practitioners who will share their tips for Big Data technologies and data management strategies.

      • Date: 19 Oct 2016
      • Online
      event logo
      V3 Technology Awards

      2016 V3 Awards

      • Date: 25 Nov 2016
      • London
      View all events
      Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Whitepapers
    • V3-resources-120x194
      Leveraging data for small businesses

      The most successful businesses are those with confidence in their ability to store, access and use data effectively.  Rather than focusing on the nuts and bolts of storage, this view point looks at the data it holds and more importantly, what can be done with it.

      Download
      V3-resources-120x194
      Getting the SMB network just right

      This review looks at why small businesses need to stop being complacent about their networks and at what they can do to maintain their competitive edge as they follow the big boys down the route of increasing collaboration and other bandwidth-hungry applications likely to impact on network performance and availability.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • SMB Spotlight
  • Sign in
  •  
    •  

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      Forgot your password?
     
     
      • Saved articles
      • Newsletters
      • Apps
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
    • Apps
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    Forgot your password?
 
 
    • Saved articles
    • Newsletters
    • Apps
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Security

Middle Eastern hackers use remote access Trojan to infect 24,000 machines worldwide

Hacking groups caught using njRAT malware for botnet building, data theft and hacktivism

Malware cyber criminal
  • Alastair Stevenson
  • Alastair Stevenson
  • @MonkeyGuru
  • 01 April 2014
  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
0 Comments

Security firm Symantec has uncovered 487 groups actively using njRAT malware, claiming the malicious users have managed to infect 24,000 machines worldwide.

Symantec threat lab researchers reported the campaigns in a blog post, confirming the hackers are using the njRAT malware for a variety of purposes.

"Symantec has identified 487 groups of attackers mounting attacks using njRAT. These attacks appear to have different motivations, which can be broadly classed as hacktivism, information theft and botnet building," the researchers said.

"The malware can be used to control networks of computers, known as botnets. While most attackers using njRAT appear to be engaged in ordinary cyber-criminal activity, there is also evidence that several groups have used the malware to target governments in the region."

Symantec said the attacks mainly originate from the Middle East, though they have managed to infect thousands of systems worldwide.

"Symantec analysed 721 samples of njRAT and uncovered a fairly large number of infections, with 542 control and command (C&C) server domain names found and 24,000 infected computers worldwide," read the post.

"Nearly 80 percent of the C&C servers were located in regions in the Middle East and North Africa, including Saudi Arabia, Iraq, Tunisia, Egypt, Algeria, Morocco, the Palestinian Territories and Libya. "

The njRAT malware is a simple attack tool that originally appeared for download on several black market forums in June 2013.

The malware grants hackers basic powers, such as the ability to download and execute additional malware on infected systems, execute shell commands, read and write registry keys, capture screenshots, log keystrokes and hijack control of webcams.

The Symantec researchers said they expect hackers' interest in njRAT to end fairly quickly, as the new hacker groups realise its limitations and move on to more advanced malware.

"The more advanced threat actors, such as hacker groups, may continue to use njRAT for targeted attacks in the short term," read the post.

"For example, a report by the Electronic Frontier Foundation (EFF) and Citizen Lab found that njRAT is one of a number of tools being used to target Syrian opposition groups during the Syrian conflict. However, Symantec anticipates that such groups will eventually depart from using publicly available tools like njRAT and begin to develop their own tools and more advanced RATs for cyber attacks."

Symantec's discovery follows wider reports within the security community that hackers are tweaking their attacks to use RATs. Advanced threat specialist FireEye uncovered evidence in February that hackers are dropping standard malware such as Zeus, in favour of more advanced but harder-to-use RATs, such as Xtreme RAT.

  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
  • Topics
  • Security
  • Symantec
  • Hacking
  • cyber-crime
  • malware

V3 Latest

iphone 6s plus in grey
Apple sees smartphone slump but Samsung soars amid global market growth

Gartner data shows BlackBerry and Windows Phone all but dead

  • Mobile Phones
  • 19 August 2016
surveillance-eye-watching-you
Bulk data collection by MI5, MI6 and GCHQ is warranted, says terrorism watchdog

Report seized on by government to justify Snoopers' Charter

  • Government
  • 19 August 2016
Uber and Volvo team up for self-driving car development
Uber and Volvo partner for $300m self-driving car push

Firms will create new base vehicle to further self-driving ambitions

  • Gadgets
  • 19 August 2016
Sainsbury's sign
Sainsbury's creates chief data officer role

New post designed to to 'enhance data-driven approach to retailing'

  • Databases
  • 19 August 2016
blog comments powered by Disqus
Back to Top

Most read

Galaxy Note 7 render
Samsung Galaxy Note 7 release date, price, specs and features
Microsoft Windows 10 on a laptop
Windows 10 Anniversary Update: 8 ways to tackle problems caused by latest release
Surface Book fulcrum hinge
Microsoft Surface Book 2 release date, specs and price rumours
Lenovo Ideapad 710S
Lenovo Ideapad 710S review
surveillance-eye-watching-you
Bulk data collection by MI5, MI6 and GCHQ is warranted, says terrorism watchdog
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About Incisive Media
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube
  • Apps

© Incisive Business Media Limited

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 9177174 & 9178013

Digital publisher of the year 2010, 2013 & 2016

Digital publisher of the year 2010, 2013 & 2016