Security Alerts & News
by Tymoteusz A. Góral

#2232 New open source RAT uses Telegram protocol to steal data from victims
Someone has created a new Remote Access Trojan (RAT) that uses the Telegram protocol to steal user data from infected devices.

The RAT is written in Python and is currently available as a free download on a public code sharing portal.

The RAT's author, whose name we won't be sharing, claims to have embarked into creating this tool as a way to improve how most of today's RATs work.

The author highlights that the biggest problem with most RATs is that they don't use encryption and require that the attacker enable port forwarding on the victim's machine to control infected hosts.

The developer proposes his own tool, named RATAtack, which uses the Telegram protocol to support an encrypted channel between victims and their master, and does not need port forwarding, as the Telegram protocol also provides a simple method to communicate to the target without configuring port forward beforehand on the target.
Read more
#2239 BrickerBot author claims he bricked two million devices
#2238 Beware! Dozens of Linksys WiFi router models vulnerable to multiple flaws
#2237 Location tracking Android spyware found in Google Play store
#2236 Windows bug used to spread Stuxnet remains world’s most exploited
#2235 Credit card with a fingerprint sensor revealed by Mastercard
#2234 Researchers find commercial banking apps contain swarms of open-source bugs
#2233 Report: Cybercriminals prefer Skype, Jabber and ICQ
#2232 New open source RAT uses Telegram protocol to steal data from victims
#2231 Microsoft turns 2FA into one-factor by ditching password
#2230 Hajime worm battles Mirai for control of the IoT
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12