Topic: keylogging capabilities

  • Stealthy Fileless Malware Spreads RAT via Legitimate Tools

    Stealthy Fileless Malware Spreads RAT via Legitimate Tools

    A fileless malware campaign uses trusted tools like ScreenConnect and PowerShell to deploy a remote access Trojan, leaving minimal forensic traces and evading detection. The attack loads payloads directly into memory via reflection, employs a .NET launcher to establish persistence and disable sec...

    Read More »
  • MonsterRAT: Stealthy Malware Threatens Windows Systems

    MonsterRAT: Stealthy Malware Threatens Windows Systems

    A sophisticated phishing campaign distributes the previously undocumented MonsterRAT malware, which targets Windows systems and grants attackers full administrative control through a multi-stage infection process. The attack uses phishing emails disguised as business correspondence to deliver the...

    Read More »