• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

AllTech.News

Trump Sex Scandal Video Is a RAT

You are here: Home / Cyber Security News / Trump Sex Scandal Video Is a RAT

Cyber-attackers are disguising malware as a video clip file depicting a fake sexual intercourse scandal involving United States President Donald Trump.

The email-based mostly attack was found out by cybersecurity researchers at Trustwave who ended up reviewing their spam traps. 

Targets are despatched an email with the attachment “TRUMP_Sexual intercourse_SCANDAL_Video clip.jar”. People who simply click on the destructive Java Archive (JAR) file unwittingly set up the Qnode Distant Access Trojan (RAT) onto their laptop. 

Unusually, the title of the destructive file bore no resemblance to the subject matter of the email to which it was hooked up.

When the researchers opened the email “GOOD Personal loan Offer you!!,” they envisioned to learn absolutely nothing a lot more than an financial investment scam. Having said that, attached to the email was an archive that contains the destructive JAR file.

“We suspect that the terrible guys are making an attempt to journey the frenzy introduced about by the lately concluded Presidential elections due to the fact the filename they employed on the attachment is absolutely unrelated to the email’s theme,” wrote researchers. 

An investigation into the attack discovered that the JAR file is a variant of a QRAT downloader researchers brought to the public’s awareness in August. Similarities concerning the new and old variants involve Allatori Obfuscator’s becoming utilized to obfuscate the JAR file and the installer of Node.Js’s getting retrieved from the formal web-site nodejs.org. 

As is the case with the previous variants, scientists observed that the new downloader supports Windows platforms only.

Scientists famous that even though the Trump intercourse scandal email marketing campaign applied to provide the malware “was relatively amateurish,” the new QRAT was a lot more innovative than prior variants.

“This threat has been substantially increased about the past number of months due to the fact we initial examined it. To accomplish the similar conclude objective, which is to infect the technique with a QNode RAT, the JAR file downloader properties and behavior were improved,” wrote researchers.

The attackers ditched the string “qnodejs,” which can distinguish the data files linked to this danger. And, to prevent detection, they break up up the destructive code of the downloader into various buffers inside the JAR. 

Scientists recommended email directors to “consider a difficult line” versus inbound JARs and to use their email security gateways to block them.

Some parts of this article are sourced from:
www.infosecurity-journal.com

Previous Post: « Nvidia Warns Windows Gamers of High-Severity Graphics Driver Flaws
Next Post: Longest intergalactic gas filament discovered AllTech.News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
  • Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play
  • Malicious Pull Request Infects 6,000+ Developers via Vulnerable Ethcode VS Code Extension
  • 5 Ways Identity-based Attacks Are Breaching Retail
  • RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks

Copyright © 2025 · AllTech.News, All Rights Reserved.