<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Rat — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/rat/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 13:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/rat/feed.xml" rel="self" type="application/rss+xml"/><item><title>ClickFix 'BackgroundFix' Campaign Delivers CastleLoader, NetSupport RAT, and CastleStealer</title><link>https://feed.craftedsignal.io/briefs/2026-04-clickfix-backgroundfix/</link><pubDate>Thu, 30 Apr 2026 13:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-clickfix-backgroundfix/</guid><description>The 'BackgroundFix' ClickFix campaign uses social engineering to trick victims into downloading malware disguised as a free image-editing tool, leading to the deployment of CastleLoader, NetSupport RAT for remote access, and CastleStealer for credential theft.</description><content:encoded><![CDATA[<p>The BackgroundFix campaign is a social engineering scheme using fake &ldquo;remove your photo background&rdquo; services to deliver malware. Victims are lured to malicious sites mimicking legitimate image editing tools. The sites feature fake upload interfaces, progress bars, and download buttons to appear authentic. This campaign delivers a multi-stage payload, starting with CastleLoader. CastleLoader then drops NetSupport RAT, enabling remote access for the attackers, and CastleStealer, a custom .NET stealer designed to exfiltrate browser credentials, wallet extension data, and Telegram session files. This campaign appears to be active, with multiple domains sharing the same template.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Victim searches for an online background removal tool and lands on a malicious BackgroundFix site.</li>
<li>The victim uploads an image to the fake website.</li>
<li>After clicking a checkbox, the site instructs the victim to copy a command to their clipboard.</li>
<li>The copied command executes <code>finger.exe</code> to query <code>cheeshomireciple[.]com</code></li>
<li><code>finger.exe</code> retrieves a batch script from the C2 server.</li>
<li>The batch script executes commands to download and execute further payloads.</li>
<li>CastleLoader is deployed, subsequently dropping NetSupport RAT and CastleStealer.</li>
<li>NetSupport RAT grants the attacker remote access, while CastleStealer exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful attacks result in the installation of NetSupport RAT, granting attackers remote control over the compromised system. Additionally, CastleStealer exfiltrates sensitive information such as browser credentials, wallet extension data, and Telegram session files. This stolen data can be used for further malicious activities, including financial fraud, identity theft, and unauthorized access to sensitive accounts. The active nature of the campaign and the use of multiple domains suggest a broad targeting scope.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for the execution of <code>finger.exe</code> with command-line arguments pointing to external domains (IOC: <code>cheeshomireciple[.]com</code>).</li>
<li>Deploy the Sigma rule to detect the execution of <code>finger.exe</code> to identify potential initial access attempts.</li>
<li>Block the C2 domain <code>cheeshomireciple[.]com</code> at the DNS resolver to prevent initial payload delivery.</li>
<li>Monitor network connections for NetSupport RAT C2 communications on port 688 to detect compromised systems (IOCs: <code>poronto[.]com:688</code>, <code>giovettiadv[.]com:688</code>).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>clickfix</category><category>malware</category><category>social-engineering</category><category>rat</category><category>infostealer</category><category>castleloader</category><category>netsupport</category></item><item><title>Komari Agent Abused as SYSTEM-Level Backdoor</title><link>https://feed.craftedsignal.io/briefs/2026-04-komari-red/</link><pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-komari-red/</guid><description>Threat actors are abusing the Komari monitoring agent, a project hosted on GitHub, as a SYSTEM-level backdoor following initial access through compromised VPN credentials and lateral movement via Impacket.</description><content:encoded><![CDATA[<p>Huntress discovered threat actors leveraging the Komari monitoring agent as a SYSTEM-level backdoor within a partner environment. Komari, a Go-based project on GitHub with over 4,000 stars, is designed as a remote-control and monitoring tool. This incident marks a publicly documented case of Komari being abused in a real-world intrusion. The attackers compromised VPN credentials to gain initial access before deploying the Komari agent as a persistent backdoor. Komari inherently functions as a command-and-control (C2) channel, with features enabled by default. The threat actor installed Komari as a Windows service named &ldquo;Windows Update Service&rdquo; using NSSM, directly from the official GitHub repository, which avoided the need for attacker-controlled staging infrastructure. The initial discovery occurred on April 16, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker establishes an SSLVPN session on a FortiGate device from IP address 45.153.34[.]132, authenticating as a legitimate user, [User 1].</li>
<li><strong>Internal Reconnaissance:</strong> After establishing the VPN connection, the attacker&rsquo;s workstation, identified as VM8514, begins enumerating the internal network from the tunnel IP 10.212.134[.]200.</li>
<li><strong>Lateral Movement:</strong> Using Impacket&rsquo;s smbexec.py, the attacker enables Remote Desktop Protocol (RDP) on the target workstation, [REDACTED-WRKSTN].</li>
<li><strong>RDP Access:</strong> The attacker establishes an interactive RDP session to [REDACTED-WRKSTN].</li>
<li><strong>Persistence - Service Creation:</strong> The attacker uses the Non-Sucking Service Manager (NSSM) to install the Komari agent as a persistent Windows service named &ldquo;Windows Update Service&rdquo;.</li>
<li><strong>Agent Download:</strong> The Komari agent is downloaded from raw.githubusercontent[.]com/komari-monitor/komari-agent using a PowerShell one-liner executed directly on the system.</li>
<li><strong>Command and Control:</strong> The Komari agent establishes a persistent WebSocket connection to its server, allowing the attacker to execute arbitrary commands (PowerShell/sh) and initiate interactive PTY reverse shell sessions.</li>
<li><strong>Maintain Access &amp; Execute:</strong> The attacker maintains SYSTEM-level access via the persistent Komari agent, enabling ongoing remote command execution and control over the compromised workstation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This attack demonstrates how readily available monitoring tools can be weaponized for malicious purposes. A single compromised account led to the establishment of a SYSTEM-level backdoor on a critical workstation. This could result in data exfiltration, further lateral movement within the network, and potentially ransomware deployment. Microsoft Defender quarantined an earlier registry hive dumping attempt, preventing further data compromise. The number of affected organizations is currently unknown, but any organization using the Komari agent without proper security controls is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor FortiGate logs for SSLVPN sessions originating from suspicious IP addresses (45.153.34[.]132) and unusual ASN&rsquo;s (ASN 51396) to detect potentially compromised credentials.</li>
<li>Implement the Sigma rule &ldquo;Detect Komari Agent Installation via PowerShell&rdquo; to identify installations of the Komari agent.</li>
<li>Monitor process creation events for the execution of <code>nssm.exe</code> installing a service named &ldquo;Windows Update Service&rdquo; to detect suspicious service installations.</li>
<li>Block the domain raw.githubusercontent[.]com at the DNS resolver or web proxy to prevent the downloading of malicious tools and payloads.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>komari</category><category>backdoor</category><category>nssm</category><category>github</category><category>rat</category><category>reverse shell</category></item><item><title>Mirax RAT Targeting Android Users in Europe</title><link>https://feed.craftedsignal.io/briefs/2026-04-mirax-rat/</link><pubDate>Thu, 16 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mirax-rat/</guid><description>Mirax RAT, a new Android RAT distributed as MaaS, is targeting European users by turning infected devices into residential proxy nodes and enabling credential theft via overlay and notification injection.</description><content:encoded><![CDATA[<p>The Mirax RAT is a newly identified Android Remote Access Trojan (RAT) that has been actively targeting users in Europe since March 2026. It&rsquo;s offered as Malware-as-a-Service (MaaS) to a small group of affiliates, primarily Russian-speaking actors, through tiered subscription models. Since December 2025, Mirax has been promoted on underground forums and used in multiple campaigns. The RAT&rsquo;s distribution relies on malicious advertisements on Meta platforms like Facebook, Instagram, and Messenger, with over 200,000 users potentially exposed to these ads. The malware uses dropper pages hosted on GitHub and relies on APK sideloading for execution, bypassing the Google Play Store&rsquo;s security measures. Mirax&rsquo;s capabilities extend beyond typical RAT functions, including turning infected devices into residential proxy nodes via a SOCKS5 proxy.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker creates malicious ads on Facebook, Instagram, and Messenger promoting IPTV application services.</li>
<li>Users click on the advertisements, which redirect them to dropper pages hosted on GitHub.</li>
<li>The user is prompted to enable installation from unknown sources on their Android device.</li>
<li>The malicious IPTV application is installed via APK sideloading.</li>
<li>The application initiates a multi-stage infection process, utilizing Golden Encryption (Golden Crypt) to pack the payload.</li>
<li>The payload, an encrypted Dalvik Executable (.dex) file, is decrypted during installation using the RC4 stream cipher with a hardcoded key.</li>
<li>Mirax gains control of the device, enabling overlay and notification injection for credential theft.</li>
<li>Attackers can view the screen in real-time, navigate and control the device, manage applications, exfiltrate images and text, and launch a SOCKS5 proxy connection to proxy traffic through the infected device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The Mirax RAT campaign has the potential to affect a large number of Android users in Europe. The malicious advertisements have already reached over 200,000 users. Successful infections can lead to credential theft, financial fraud, data exfiltration, and the compromised device being used as a residential proxy, potentially masking malicious activity and further expanding the attacker&rsquo;s reach. Banks and financial institutions are specifically highlighted as high-value targets.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for connections to GitHub domains associated with APK downloads, and correlate that with android device user agents (Network Connection and User Agent logs).</li>
<li>Implement detections for process creation events related to sideloaded APK installations, specifically looking for unusual parent-child process relationships (Process Creation Logs).</li>
<li>Deploy the Sigma rule provided below to detect the execution of applications from untrusted sources and tune for your environment.</li>
<li>Monitor network connections for SOCKS5 proxy traffic originating from Android devices, which may indicate compromised devices acting as residential proxies (Network Connection Logs).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>android</category><category>rat</category><category>mirax</category><category>malware-as-a-service</category><category>proxy</category></item><item><title>Axios npm Package Compromised via Social Engineering</title><link>https://feed.craftedsignal.io/briefs/2026-04-axios-npm-hack/</link><pubDate>Sat, 04 Apr 2026 20:30:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-axios-npm-hack/</guid><description>North Korean threat actors (UNC1069) compromised the Axios npm package by socially engineering a maintainer with a fake Microsoft Teams update delivering a RAT, leading to the injection of a malicious dependency and a supply chain attack.</description><content:encoded><![CDATA[<p>On April 4, 2026, the maintainers of the Axios HTTP client disclosed a social engineering attack targeting one of their developers. The attack, attributed to the North Korean threat actor UNC1069, involved impersonating a legitimate company to build trust with the targeted developer. The attacker used a fake Microsoft Teams update disguised as a critical error fix to deploy a remote access trojan (RAT). This RAT allowed the attackers to gain access to the developer&rsquo;s system and npm credentials. The attackers then published two malicious versions of Axios (1.14.1 and 0.30.4) to the npm package registry. These malicious versions included a dependency called plain-crypto-js, which installed a RAT on macOS, Windows, and Linux systems. These versions were available for three hours, posing a supply chain risk to any systems that installed them during that period.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a target developer and initiates contact via LinkedIn/Slack, impersonating a legitimate company.</li>
<li>The attacker invites the developer to a Slack workspace populated with fake profiles and staged company activity.</li>
<li>A meeting is scheduled on Microsoft Teams, during which a fake &ldquo;RTC Connection&rdquo; error message is displayed.</li>
<li>The attacker prompts the developer to install a &ldquo;Teams update&rdquo; to resolve the error.</li>
<li>The fake update is a RAT malware, granting the attacker remote access to the developer&rsquo;s machine.</li>
<li>The attacker steals the developer&rsquo;s npm credentials, bypassing MFA due to already authenticated session.</li>
<li>The attacker publishes malicious versions of the Axios package (1.14.1 and 0.30.4) to the npm registry, injecting the plain-crypto-js dependency.</li>
<li>Systems installing the compromised Axios versions download and execute the plain-crypto-js package, resulting in RAT deployment and credential theft.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The compromise of the Axios npm package created a supply chain attack impacting an unknown number of systems across various sectors. Systems that installed the malicious versions (1.14.1 and 0.30.4) within the three-hour window are considered compromised. Successful exploitation results in the installation of a remote access trojan (RAT) capable of stealing credentials, browser data, and other sensitive information from macOS, Windows, and Linux systems. This can lead to further unauthorized access, data breaches, and potential financial loss.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor npm package installations for the presence of the plain-crypto-js dependency, particularly in projects that use Axios versions 1.14.1 or 0.30.4.</li>
<li>Implement multi-factor authentication (MFA) for npm accounts and other developer accounts, but recognize that authenticated sessions can be hijacked.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious NPM Package Installation&rdquo; to detect potentially malicious package installations based on unusual parent processes (see below).</li>
<li>Block the domain associated with the malicious dependency plain-crypto-js at the DNS resolver.</li>
<li>Educate developers about social engineering tactics and the risks of installing software from untrusted sources.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>supply chain attack</category><category>npm</category><category>social engineering</category><category>rat</category><category>unc1069</category></item><item><title>Axios NPM Supply Chain Attack Delivering Platform-Specific RATs</title><link>https://feed.craftedsignal.io/briefs/2026-04-axios-npm-supply-chain/</link><pubDate>Sat, 04 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-axios-npm-supply-chain/</guid><description>A supply chain attack on the Axios NPM package injected malicious code into versions v1.14.1 and v0.30.4, leading to the deployment of platform-specific remote access trojans (RATs) after the installation of a rogue dependency that communicated with attacker-controlled infrastructure to retrieve malicious payloads for Windows, MacOS, and Linux.</description><content:encoded><![CDATA[<p>On March 31, 2026, the official Axios node package manager (npm) package was compromised in a supply chain attack. The attack resulted in the deployment of two malicious versions, v1.14.1 and v0.30.4. Axios is a widely-used JavaScript library for making HTTP requests, with approximately 100 million downloads per week. The malicious packages were available for around three hours. The compromised packages introduced a fake runtime dependency, &lsquo;plain-crypto-js&rsquo;, that executes automatically after installation. This dependency then communicates with attacker-controlled infrastructure at 142.11.206.73, pulling down platform-specific payloads for Linux, MacOS, and Windows. The payloads are remote access trojans (RATs), enabling the attackers to gather information and execute additional malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromised the Axios NPM package and injected malicious code.</li>
<li>Malicious versions v1.14.1 and v0.30.4 were published to the NPM registry.</li>
<li>The malicious packages introduce a fake runtime dependency named &lsquo;plain-crypto-js&rsquo;.</li>
<li>Upon installation of the compromised package, the &lsquo;plain-crypto-js&rsquo; dependency executes automatically via a post-install script.</li>
<li>The dependency connects to the attacker-controlled IP address 142.11.206.73 to retrieve a platform-specific payload.</li>
<li>On MacOS, a binary named &ldquo;com.apple.act.mond&rdquo; is downloaded and executed using zsh.</li>
<li>On Windows, a PowerShell script (6202033.ps1) is downloaded, and the legitimate powershell.exe is copied to &ldquo;%PROGRAM DATA%\wt.exe&rdquo;, and the ps1 script is executed with hidden and execution policy bypass flags.</li>
<li>On Linux, a Python backdoor is downloaded and executed. The downloaded executables act as Remote Access Trojans (RATs) exfiltrating credentials and enabling remote management.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This supply chain attack could lead to significant compromise across numerous organizations using the Axios library. The actors exfiltrate credentials and gain remote management capabilities. All credentials present on systems that installed the malicious package should be considered compromised and immediately rotated. The widespread use of Axios means the impact could extend to many applications and systems, potentially enabling further attacks leveraging compromised credentials. Supply chain attacks like these affecting widely used libraries, as seen in 25% of the top 100 vulnerabilities in the Cisco Talos 2025 Year in Review, highlight the substantial risk they pose.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Roll back to safe Axios versions (v1.14.0 or v0.30.3) immediately to prevent further compromise, as mentioned in the overview.</li>
<li>Investigate systems that downloaded malicious packages (v1.14.1 or v0.30.4) for signs of follow-on payloads from the actor-controlled infrastructure, as described in the overview.</li>
<li>Block the actor-controlled IP address 142.11.206.73 and domain Sfrclak.com at the network perimeter to prevent further communication with the malicious infrastructure, per the IOC list.</li>
<li>Monitor for execution of PowerShell scripts from unusual locations, specifically &ldquo;%PROGRAM DATA%\wt.exe&rdquo;, as part of the attack chain.</li>
<li>Implement a process creation rule to alert when processes connect to external IPs using uncommon parent processes. See example rule below.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>npm</category><category>javascript</category><category>rat</category></item><item><title>Compromised Axios Library Leads to RAT Deployment via @usebruno/cli</title><link>https://feed.craftedsignal.io/briefs/2026-04-axios-supply-chain/</link><pubDate>Fri, 03 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-axios-supply-chain/</guid><description>Compromised versions of the `axios` npm package introduced a hidden dependency deploying a cross-platform Remote Access Trojan (RAT), impacting users of `@usebruno/cli` who ran `npm install` between 00:21 UTC and ~03:30 UTC on March 31, 2026, potentially leading to credential exfiltration.</description><content:encoded><![CDATA[<p>On March 31, 2026, a supply chain attack targeted the <code>axios</code> npm package, a widely used HTTP client library for JavaScript. Compromised versions 1.14.1 and 0.30.4 of the library were injected with malicious code that installed a cross-platform Remote Access Trojan (RAT) on systems that installed the affected versions of <code>@usebruno/cli</code>. This attack specifically impacted users of the <code>@usebruno/cli</code> who performed an <code>npm install</code> within a roughly 3-hour window, between 00:21 UTC and 03:30 UTC. The malicious code was designed to execute during the <code>postinstall</code> phase of the package installation, indicating a targeted effort to compromise developer environments. This incident highlights the increasing risk of supply chain attacks targeting open-source software and the importance of verifying the integrity of third-party dependencies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker compromises the <code>axios</code> npm package, injecting malicious code into versions 1.14.1 and 0.30.4.</li>
<li>The compromised <code>axios</code> package is published to the npm registry.</li>
<li>A user of <code>@usebruno/cli</code> executes <code>npm install</code> within the attack window (00:21 UTC - 03:30 UTC on March 31, 2026).</li>
<li>The npm package manager resolves the dependency chain and downloads the compromised <code>axios</code> package as a dependency of <code>@usebruno/cli</code>.</li>
<li>The malicious code within the <code>axios</code> package executes during the <code>postinstall</code> script phase of the installation process.</li>
<li>The <code>postinstall</code> script downloads and installs a cross-platform Remote Access Trojan (RAT) on the user&rsquo;s system.</li>
<li>The RAT establishes a connection to a remote command-and-control (C2) server.</li>
<li>The attacker uses the RAT to exfiltrate credentials and other sensitive data from the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This supply chain attack could have resulted in widespread compromise of developer systems that used the <code>@usebruno/cli</code>. While the number of affected users is unknown, the incident could have led to the exfiltration of sensitive credentials and proprietary source code, potentially enabling further attacks against the affected organizations and their customers. The incident underscores the need for robust security measures in software development pipelines and continuous monitoring of third-party dependencies for malicious activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>If <code>@usebruno/cli</code> was installed during the affected window, reinstall dependencies to ensure a clean version of <code>axios</code> is used (reference: Impact section).</li>
<li>Rotate all credentials and secrets that were present on systems where <code>@usebruno/cli</code> was installed during the affected window (reference: Impact section).</li>
<li>Review and implement the security guidance provided in the Aikido Security blog post to further harden your systems (reference: <a href="https://www.aikido.dev/blog/axios-npm-compromised-maintainer-hijacked-rat)">https://www.aikido.dev/blog/axios-npm-compromised-maintainer-hijacked-rat)</a>.</li>
<li>Monitor process creation events for unusual processes spawned by npm or node processes, using the provided Sigma rule (reference: Sigma rule - &ldquo;Detect Suspicious Process Spawned by NPM&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>npm</category><category>rat</category><category>credential-theft</category></item><item><title>PylangGhost RAT Observed on npm Registry</title><link>https://feed.craftedsignal.io/briefs/2024-01-pylangghost-npm/</link><pubDate>Mon, 16 Mar 2026 04:45:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-pylangghost-npm/</guid><description>A new remote access trojan (RAT) named PylangGhost has been observed on the npm registry, posing a supply chain risk to developers and applications using affected packages.</description><content:encoded><![CDATA[<p>A new remote access trojan (RAT) named PylangGhost has been discovered on the npm registry. This marks the first known instance of this specific RAT being distributed via a software supply chain attack on the npm ecosystem. The RAT is named for its use of Python and potentially for obfuscation or evasion techniques. The affected npm packages are designed to inject malicious code into projects that depend on them. This malicious code facilitates unauthorized remote access to infected systems, thereby providing threat actors with the ability to exfiltrate sensitive data, deploy further malware, or perform other malicious activities. This is a supply chain attack that endangers developers and applications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A developer installs a malicious package from the npm registry containing PylangGhost.</li>
<li>During the installation process, a post-install script or similar mechanism executes, injecting the PylangGhost RAT into the developer&rsquo;s environment.</li>
<li>The RAT establishes a connection to a command-and-control (C2) server controlled by the attacker.</li>
<li>The C2 server sends commands to the infected system, instructing the RAT to perform specific actions.</li>
<li>The RAT executes the commands, potentially including data exfiltration, downloading and executing additional payloads, or establishing persistence.</li>
<li>Sensitive data, such as credentials, API keys, or source code, is exfiltrated from the compromised system to the C2 server.</li>
<li>The attacker gains remote access and control over the compromised system, enabling further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The presence of PylangGhost on the npm registry introduces a significant supply chain risk.  Successful infection allows attackers to gain remote access to developer systems, potentially leading to the theft of sensitive source code, credentials, and other proprietary information. The compromise can extend to applications built using the infected packages, impacting downstream users and potentially leading to widespread data breaches or service disruptions. The number of affected victims is currently unknown, but the risk is widespread due to the popularity of the npm registry.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor npm package installations for suspicious post-install scripts or unexpected network connections (see related Sigma rules).</li>
<li>Implement strong dependency scanning tools to identify and remove potentially malicious packages from your projects.</li>
<li>Analyze network connection logs for connections to unusual or malicious domains after npm package installations (see related Sigma rules).</li>
<li>Enable process monitoring for any processes spawned during or after npm package installations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>supply-chain</category><category>rat</category><category>npm</category><category>pylangghost</category></item><item><title>Fileless Multi-Stage Remcos RAT via Phishing</title><link>https://feed.craftedsignal.io/briefs/2024-01-remcos-fileless/</link><pubDate>Sun, 15 Mar 2026 15:34:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remcos-fileless/</guid><description>A fileless multi-stage Remcos RAT is delivered via phishing, achieving memory-resident execution, but specific technical details are not provided in this brief.</description><content:encoded><![CDATA[<p>This threat brief discusses a Remcos RAT infection chain that utilizes a fileless, multi-stage approach. While specific details regarding the initial phishing lure, exploitation method, and Remcos RAT version are absent from the original report, the core focus is on the fileless execution and memory residency of the RAT. The attack begins with an unspecified phishing attack and culminates in a Remcos RAT running entirely in memory, hindering traditional disk-based forensic analysis. This type of attack poses a significant challenge to traditional endpoint detection and response (EDR) solutions. The scope and scale of this campaign are unknown, but fileless techniques are generally employed in targeted attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unsuspecting user receives a phishing email containing a malicious attachment or link (specific delivery mechanism not specified).</li>
<li>The user interacts with the malicious content, initiating the first stage of the attack.</li>
<li>A script (e.g., PowerShell, VBScript) is executed, likely delivered through the phishing attachment/link.</li>
<li>The script downloads and executes additional payloads directly into memory, avoiding writing files to disk.</li>
<li>The downloaded payload injects Remcos RAT into a legitimate system process (process injection).</li>
<li>Remcos RAT establishes a command and control (C2) connection with the attacker&rsquo;s server for further instructions.</li>
<li>The attacker can then perform various malicious activities such as data exfiltration, keylogging, or lateral movement.</li>
<li>The Remcos RAT persists in memory, potentially evading detection by signature-based antivirus solutions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful deployment of Remcos RAT can lead to significant data breaches, intellectual property theft, and financial losses. Victims may experience system instability, unauthorized access to sensitive information, and reputational damage. The fileless nature of the attack makes it harder to detect and remediate, potentially prolonging the dwell time and increasing the overall impact. The number of victims and targeted sectors are not specified in the original source.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell script block logging and transcription to enhance visibility into potentially malicious script execution (reference attack chain step 3).</li>
<li>Monitor process creation events for suspicious parent-child relationships (e.g., <code>cmd.exe</code> or <code>powershell.exe</code> spawning uncommon processes) to detect injected Remcos processes (reference attack chain step 5).</li>
<li>Deploy the Sigma rules provided below to your SIEM and tune them for your specific environment.</li>
<li>Implement application control policies to restrict the execution of unauthorized or unknown scripts and binaries (reference attack chain step 4).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>remcos</category><category>rat</category><category>fileless</category><category>phishing</category></item></channel></rss>