Malware

DCRat Malware Spreads via HTML Smuggling

Cyber security concept. Toy horse on a digital screen, symbolizes the attack of the Trojan virus. 3D illustration.

HTML smuggling has been leveraged for the first time by threat actors to target Russian-speaking users with the DCRat community trojan, also known as DarkCrystal RAT, The Hacker News reports.

Attacks involved the distribution of malicious Russian-language HTML files impersonating TrueConf and VK Messenger apps, which when opened stealthily downloads a password-protected ZIP file with a nested RarSFX archive that launches DCRat that not only enables shell command execution and keystroke logging but also allows file and credential exfiltration, an analysis from Netskope revealed.

Such a development follows an HP Wolf Security report detailing another HTML smuggling attack that spread the AsyncRAT malware through a generative artificial intelligence-based dropper.

"The scripts' structure, comments and choice of function names and variables were strong clues that the threat actor used GenAI to create the malware. The activity shows how GenAI is accelerating attacks and lowering the bar for cybercriminals to infect endpoints," said HP Wolf Security.

Related Terms

Adware

You can skip this ad in 5 seconds

Cookies

This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.