#AsyncRat

Top 10 last week's threats by uploads 🌐
⬇️ #Lumma 520 (598)
⬆️ #Agenttesla 321 (170)
⬆️ #Xworm 298 (270)
⬇️ #Asyncrat 249 (295)
⬇️ #Zombie 206 (218)
⬇️ #Snake 200 (212)
⬇️ #Remcos 182 (202)
⬆️ #Lokibot 147 (118)
⬆️ #Dcrat 139 (129)
⬇️ #Njrat 134 (141)

Track them all: any.run/malware-trends/?utm_so

Top 10 last week's threats by uploads 🌐
⬆️ #Lumma 635 (628)
⬇️ #Xworm 282 (369)
⬆️ #Zombie 216 (176)
⬇️ #Snake 200 (306)
⬇️ #Asyncrat 183 (238)
⬇️ #Remcos 163 (317)
⬆️ #Amadey 153 (111)
⬇️ #Agenttesla 148 (175)
⬆️ #Njrat 147 (106)
⬇️ #Dcrat 129 (186)
Track them all: any.run/malware-trends/?utm_so

#infosec #cybersecurity

2025-07-18

📢 Analyse des variantes et forks du malware AsyncRAT
📝 L'article publié par les chercheurs d'ESET explore en détail les variantes et forks du **malware AsyncRAT**, un cheval de Troie d'accès à distance asynchrone open-source...
📖 cyberveille : cyberveille.ch/posts/2025-07-1
🌐 source : welivesecurity.com/en/eset-res
#AsyncRAT #ESET #Cyberveille

2025-07-16

Unmasking AsyncRAT: Navigating the labyrinth of forks

AsyncRAT, an open-source remote access trojan, has spawned numerous forks since its 2019 release, becoming a cornerstone of modern malware. This analysis maps out the relationships among AsyncRAT variants, focusing on prominent forks like DcRat and VenomRAT, as well as lesser-known versions. The research explores the evolution of these forks, their unique features, and the methods used to identify them. It also delves into exotic variants with specialized plugins, such as NonEuclid RAT's jump scare and malware spreader functionalities. The proliferation of AsyncRAT forks highlights the risks associated with open-source malware frameworks and the need for proactive detection strategies.

Pulse ID: 687758ff039275831fbcb386
Pulse Link: otx.alienvault.com/pulse/68775
Pulse Author: AlienVault
Created: 2025-07-16 07:47:10

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#AsyncRAT #CyberSecurity #DCRat #InfoSec #Malware #OTX #OpenThreatExchange #RAT #RCE #RemoteAccessTrojan #Trojan #Venom #bot #AlienVault

2025-07-16

Nikola Knežević created an overview of AsyncRAT forks and how they relate to each other. Great research.

#AsyncRAT #QuasarRAT
welivesecurity.com/en/eset-res

2025-07-16

New AsyncRAT Variants Use Screamer Tool and USB Malware Spreader

Cybersecurity researchers have discovered two variants of AsyncRAT, that extend its capabilities by adding psychological warfare and enhanced propagation features.

Pulse ID: 6876e73a98de0aff01a723b2
Pulse Link: otx.alienvault.com/pulse/6876e
Pulse Author: cryptocti
Created: 2025-07-15 23:41:46

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#AsyncRAT #CyberSecurity #InfoSec #Malware #OTX #OpenThreatExchange #RAT #USB #bot #cryptocti

Bobbys Bytesshadowfetch
2025-07-15

Cybersecurity’s buzzing with news of AsyncRAT malware variants like DCRat and Venom RAT causing chaos. These bad boys are stealing webcam footage and dodging antivirus like pros. Stay safe out there!

2025-07-15

#ESETresearch has mapped the labyrinth of #AsyncRAT forks, identifying the most prevalent versions of this open-source malware. While some variants are mere curiosities, others pose a more tenacious threat. welivesecurity.com/en/eset-res
AsyncRAT comes with the typical RAT functionalities, including keylogging, screen capturing, and credential theft. Other threat actors have developed a multitude of variants based on its source code.
Our analysis revealed the most widely used and deployed forks of AsyncRAT, with the most prevalent among them being #DcRat.
Although DcRat holds a smaller share compared to AsyncRAT, it offers notable improvements. These include advanced evasion techniques, and the use of an open-source library for more efficient binary data serialization.
AsyncRAT forks often include prank-style plugins, such as for opening and closing the CD tray and turning off the monitor. Spoof versions dubbed SantaRAT and BoratRAT have also emerged – mostly intended as jokes.
AsyncRAT and its variants demonstrate how quickly and creatively threat actors can adapt open-source code – especially with the assistance of #LLMs. This underscores the importance of proactive detection and effective analysis of emerging threats.
IoCs available on our GitHub: github.com/eset/malware-ioc/tr

Top 10 last week's threats by uploads 🌐
⬆️ #Lumma 657 (513)
⬆️ #Berbew 451 (78)
⬆️ #Xworm 377 (209)
⬆️ #Remcos 341 (153)
⬆️ #Snake 320 (230)
⬆️ #Asyncrat 242 (171)
⬆️ #Dcrat 189 (92)
⬆️ #Agenttesla 182 (173)
⬆️ #Zombie 182 (153)
⬆️ #Smokeloader 138 (35)
Track them all: any.run/malware-trends/?utm_so

Top 10 last week's threats by uploads 🌐
⬇️ #Lumma 523 (537)
⬆️ #Snake 232 (224)
⬆️ #Xworm 228 (175)
⬇️ #Asyncrat 180 (240)
⬆️ #Agenttesla 176 (166)
⬆️ #Amadey 175 (137)
⬇️ #Remcos 173 (184)
⬆️ #Zombie 158 (113)
⬆️ #Redline 157 (59)
⬆️ #Lockbit 142 (84)
Track them all: any.run/malware-trends/?utm_so

Top 10 last week's threats by uploads 🌐
⬆️ #Lumma 548 (484)
⬇️ #Neconyd 289 (311)
⬇️ #Asyncrat 244 (300)
⬇️ #Snake 237 (262)
⬇️ #Remcos 190 (468)
⬇️ #Xworm 179 (214)
⬇️ #Agenttesla 168 (174)
⬆️ #Lokibot 154 (145)
⬇️ #Amadey 144 (157)
⬇️ #Formbook 128 (139)
Track them all: any.run/malware-trends/?utm_so

2025-06-25

📢 Découverte de la campagne malveillante 'Shadow Vector' ciblant la Colombie
📝 La **Acronis Threat Research Unit (TRU)** a récemment mis en lumière une campagne malveillante baptisée **'Shadow Vector'**...
📖 cyberveille : cyberveille.ch/posts/2025-06-2
🌐 source : gbhackers.com/shadow-vector-ma
#AsyncRAT #RemcosRAT #Cyberveille

Top 10 last week's threats by uploads 🌐
⬆️ #Lumma 494 (346)
⬆️ #Remcos 475 (287)
⬆️ #Neconyd 330 (154)
⬆️ #Asyncrat 306 (272)
⬆️ #Dcrat 305 (235)
⬆️ #Snake 268 (174)
⬆️ #Xworm 224 (192)
⬆️ #Quasar 206 (140)
⬇️ #Agenttesla 180 (284)
⬆️ #Vidar 172 (65)
Track them all: any.run/malware-trends/?utm_so

Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:youranonriots@kolektiva.social
2025-06-20

133 backdoored #GitHub repos uncovered—67 from “Banana Squad” alone—masquerading as Python tools, game cheats & crypto apps.

Payloads include #AsyncRAT, Lumma, and Remcos—spread via GitHub, YouTube, and Discord.

Dev tools are the new delivery vector. #CyberSecurity thehackernews.com/2025/06/67-t

Top 10 last week's threats by uploads 🌐
⬇️ #Lumma 353 (490)
⬆️ #Remcos 292 (228)
⬆️ #Agenttesla 291 (251)
⬆️ #Asyncrat 273 (190)
⬆️ #Dcrat 242 (159)
⬆️ #Xworm 198 (195)
⬇️ #Snake 180 (203)
⬇️ #Neconyd 175 (220)
⬆️ #Quasar 144 (115)
⬆️ #Darkcrystal 113 (73)
Track them all: any.run/malware-trends/?utm_so

#cybersecurity #infosec

Top 10 last week's threats by uploads 🌐
⬆️ #Lumma 509 (320)
⬆️ #Agenttesla 266 (164)
⬆️ #Remcos 232 (143)
⬆️ #Akira 222 (16)
⬆️ #Neconyd 221 (212)
⬇️ #Snake 211 (217)
⬇️ #Asyncrat 197 (306)
⬆️ #Xworm 195 (168)
⬆️ #Zombie 178 (123)
⬆️ #Dcrat 170 (128)

Track them all: any.run/malware-trends/?utm_so

#cybersecurity #infosec

Top 10 last week's threats by uploads 🌐
⬇️ #Lumma 328 (730)
⬇️ #Asyncrat 309 (490)
⬇️ #Snake 225 (425)
⬆️ #Maze 225 (4)
⬆️ #Neconyd 224 (111)
⬇️ #Xworm 169 (430)
⬇️ #Agenttesla 165 (219)
⬇️ #Remcos 151 (488)
⬆️ #Zombie 133 (131)
⬇️ #Dcrat 129 (215)
👉 Track them all: any.run/malware-trends/?utm_so

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst