
"PureRAT malware has been targeting Russian organizations through a sophisticated phishing campaign that has seen a significant increase in attacks since March 2023."
"The phishing campaign employs deceptive messages containing malicious attachments masquerading as legitimate documents, thereby tricking users into executing malware."
"Once installed, PureRAT creates connections to command-and-control servers and can collect sensitive system information, raising serious cybersecurity concerns for affected organizations."
"The malware’s capabilities include unauthorized fund transfers and active monitoring for sensitive information, exemplifying the evolving threat landscape for businesses."
A phishing campaign targeting Russian organizations has increasingly leveraged the PureRAT malware from March 2023 to early 2025, with a fourfold rise in attacks reported. Cybersecurity firm Kaspersky outlined how the malicious campaign begins with deceptive emails featuring RAR attachments camouflaged as Microsoft documents. This malware gathers sensitive system information, while the command-and-control server can execute various harmful actions, including unauthorized transactions and data interception, posing severe risks to the cybersecurity of the organizations involved.
Read at The Hacker News
Unable to calculate read time
Collection
[
|
...
]