#SparkRAT

2025-02-01

SparkRAT: Server Detection, macOS Activity, and Malicious Connections
#SparkRAT
hunt.io/blog/sparkrat-server-d

2025-01-31

"Unmasking SparkRAT: Detection & macOS Campaign Insights" published by Hunt.io. #SparkRAT, #macOS, #DPRK, #CTI hunt.io/blog/sparkrat-server-d

Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:youranonriots@kolektiva.social
2024-03-25

#TrendMicro researchers have observed instances of threat actors exploiting two disclosed vulnerabilities in #TeamCity to deploy different #malware types such as the Jasmin #ransomware, an XMRig cryptominer variant, and the #SparkRAT backdoor. #CyberAttack
trendmicro.com/en_us/research/

2024-03-20

Exploitation of CVE-2024-27198 (9.8, disclosed on 04 March 2024 by JetBrains, has Proof of Concept, in KEV Catalog 07 March 2024: auth bypass in TeamCity) has been observed by Trend Micro to drop Jasmin ransomware, XMRig cryptocurrency miner, SparkRAT backdoor, and Cobalt Strike beacons. MITRE ATT&CK TTPs and IOC provided. 🔗 trendmicro.com/en_us/research/

#CVE_2024_27198 #KEV #CISA #JetBrains #TeamCity #vulnerability #eitw #activeexploitation #ransomware #threatintel #Jasmin #XMrig #cryptomining #SparkRAT #CobaltStrike #IOC #threatintel #proofofconcept

2023-01-24

🇨🇳 New on #SentinelLabs: Cluster of attacks in East Asia, DragonSpark uses open-source tool #SparkRAT & malware evading detection through #Golang source code interpretation. By
@milenkowski 👇​

sentinelone.com/labs/dragonspa

Yogesh Londhe :verified:YogeshLondhe@infosec.exchange
2022-12-30

#sparkrat #rat #gorat
43f414dc23490e5b319f19ef7e80df64
9e0d7778947acf40c9ebe017cb0e1c4d

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst