Skip to content
  • Computer & Technology
  • SEO
  • Technology
  • About Us
    • Contact Us
    • Advertise Here
    • Disclosure Policy
    • Sitemap
  • Tech News

BitRAT malware now spreading as a Windows 10 license activator

March 22, 2022
evan
0 Comments

Table of Contents

  • Targeting pirates with malware
  • A versatile RAT
  • Risk of piracy


Windows malware

A new BitRAT malware distribution campaign is underway, exploiting users looking to activate pirated Windows OS versions for free using unofficial Microsoft license activators.

Related Posts:

  • Apple AirPods Pro vs Apple AirPods (3rd generation): Sealed or unsealed?

BitRAT is a powerful remote access trojan sold on cybercrime forums and dark web markets for as low as $20 (lifetime access) to any cybercriminal who wants it.

As such, each buyer follows their own approach to malware distribution, ranging from phishing, watering holes, or trojanized software. 

Targeting pirates with malware

In a new BitRAT malware distribution campaign discovered by researchers at AhnLab, threat actors are distributing the malware as a Windows 10 Pro license activator on webhards.

Webhards are online storage services popular in South Korea that have a steady influx of visitors from direct download links posted on social media platforms or Discord. Due to their wide use in the region, threat actors are now more commonly using webhards to distribute malware.

The actor behind the new BitRAT campaign appears to be Korean based on some of the Korean characters in the code snippets and the manner of its distribution.

Post promoting the BitRAT dropping Windows activator
Post promoting the BitRAT dropping Windows activator (ASEC)

To properly use Windows 10, you need to purchase and activate a license with Microsoft. While there are ways to get Windows 10 for free, you still need a valid Windows 7 license to get the free upgrade.

Those who do not want to deal with licensing issues or do not have a license to upgrade commonly turn to pirating Windows 10 and using unofficial activators, many of which contain malware.

In this campaign, the malicious file promoted as a Windows 10 activator is named ‘W10DigitalActiviation.exe’ and features a simple GUI with a button to “Activate Windows 10.”

The malware downloader posing as a Windows activator
The malware downloader posing as a Windows activator (ASEC)

However, instead of activating the Windows license on the host system, the “activator” will download malware from a hardcoded command and control server operated by the threat actors.

The fetched payload is BitRAT, installed in %TEMP% as ‘Software_Reporter_Tool.exe’ and added to the Startup folder. The downloader also adds exclusions for Windows Defender to ensure that BitRAT won’t encounter detection issues.

Once the malware installation process is completed, the downloader deletes itself from the system leaving behind only BitRAT.

The downloader fetching the BitRAT payload
The downloader fetching the BitRAT payload (ASEC)

A versatile RAT

BitRAT is promoted as a powerful, inexpensive, and versatile malware that can snatch a wide range of valuable information from the host, perform DDoS attacks, UAC bypass, etc.

BitRAT supports generic keylogging, clipboard monitoring, webcam access, audio recording, credential theft from web browsers, and XMRig coin mining functionality.

Additionally, it offers remote control for Windows systems, hidden virtual network computing (hVNC), and reverse proxy through SOCKS4 and SOCKS5 (UDP). On that front, ASEC’s analysts have found strong code similarities with TinyNuke, and its derivative, AveMaria (Warzone).

The hidden desktop feature on these RATs is so valuable that some hacking groups, like the Kimsuky, incorporated them in their arsenal just to use the hVNC tool.

Risk of piracy

Even if the legal and ethical aspects are ignored, using pirated software is always a security gamble.

The more tools are used to activate illegally obtained copies of software or crack their intellectual property protection systems, the greater the chances of ending up with a nasty malware infection.

Those who can’t afford to purchase a Windows license should look at alternative options instead, such as accepting the limitations of the free version, monitoring for special offers from trustworthy platforms, or using Linux.

Ultimately, users should not trust license activators and any unsigned executable authored and released by unknown vendors to run on your system.



Source link

0 Technology Way Americas Group Technology Basic Hr Compliance & Technology Blast Technology Vs Tms Bmw Twinpower Technology Explained California Institute Of Technology Film Computer Technology Background Wallpaper Crosspointe Technology Group Csia 310 Siem Technology David Zhou Technology Dynapack International Technology Corp. Emulsion Technology Companies Erie Institiute Of Technology College Honeywell Technology Abn How Has Technology Harmed Society Ihb603b Built In Bluetooth Technology Information Technology Integration Information Technology System Administrator Certificate Julie Grush Technology Lauran Technology Corp Nj Massachusetts Institute Of Technology Area Minghe Technology Tang Shan Napa Nepa Innovative Technology Pregnancy Latest Technology Printer Technology Cartoons Professional Technology Use R Certificate In Automotive Technology Regulations Environmental Bank Information Technology Sciecne And Technology Entry Program Science And Technology Speech Seagate Technology Cusip Shenyang Ocean Technology Co.Ltd Sintec Optronics Technology Pte Ltd Sixth Wave Technology Sni Technology Westover Tx Southington Schools Technology Department Stone Technology Company Student Centered Technology Strategies Examples Sunrise Instruments Technology Inc. Universities That Specialize In Technology University Technology Office Asu Email Us Bea State Technology Exports Uwb Ultra Wide Band Technology Vanderbilt Computer Technology Program W3hat Is Induction Technology Wearable Technology Healthcare Emr Wearable Technology Speed Hpw To Web Technology Jobs Jacksonville Nc Will Socialized Medicine Disincentivize Technology Wuhan Easy Space Information Technology

« Tech View: Be wary of wartime fake news spread via social media
Windows XP Is the Third Most Popular Operating System in the World »
Sidebar

Recent Posts

  • SwitchBot Curtain Rod 2 review: This smart curtain controller gets a streamlined design
  • Dodge Co. cold case solved using new DNA technology sparks privacy concerns
  • Two key secondary players are back in Lubbock
  • Machine Learning Trends Impacting Businesses In 2022
  • Every free game on Netflix (May 2022)
Intellifluence Trusted Blogger

Archives

Categories

May 2022
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
3031  
« Apr    

BL

LP

TL

Visit Now

how to start a business

play 

pixliv Digitally first class

Theme by The WP Club . Proudly powered by WordPress

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT