A malicious campaign involves a fake website mimicking Bitdefender’s download page to distribute Venom RAT, a remote access trojan. The campaign aims to steal credentials and cryptocurrency wallets for financial gain using modular, open-source malware components. #VenomRAT #SilentTrinity #StormKitty #BitdefenderFake
Keypoints
- The campaign uses a fake website to trick users into downloading malicious files.
- Venom RAT supports remote control, credential theft, keylogging, and data exfiltration.
- Attackers utilize open-source tools like SilentTrinity and StormKitty for stealth and persistence.
- The malware campaign targets individuals’ credentials, crypto wallets, and system access.
- Multiple samples originate from the same actor using shared command and control infrastructure.
Read More: https://securityaffairs.com/178366/malware/fake-antivirus-spreads-venom-rat.html