a-study-of-remote-access-trojans
a-study-of-remote-access-trojans copied to clipboard
This repository contains a curated list of papers, articles and other sources related to remote access trojans.
Sources: - https://www.theregister.com/2021/10/01/amnesty_website_impersonator_trojan_pegasus/ - https://www.sentinelone.com/labs/sarwent-malware-continues-to-evolve-with-updated-command-functions/
Sources: - https://www.threatfabric.com/blogs/vultur-v-for-vnc.html - https://blog.cyble.com/2022/02/25/vultur-banking-trojan-spreading-via-fake-google-play-store-app/
Sources: - https://www.intezer.com/blog/research/operation-electrorat-attacker-creates-fake-companies-to-drain-your-crypto-wallets/
Sources: - https://blog.checkpoint.com/2021/04/22/turning-telegram-toxic-new-toxiceye-rat-is-the-latest-to-use-telegram-for-command-control/ - https://github.com/LimerBoy/ToxicEye
Sources: - https://blog.cyble.com/2022/03/31/deep-dive-analysis-borat-rat/
Sources: - https://twitter.com/lgomezperu/status/1524081828071710721 - https://blogs.blackberry.com/en/2022/05/dirty-deeds-done-dirt-cheap-russian-rat-offers-backdoor-bargains