In an August 2023 study, cybersecurity firm Cyfirma named EVLF as the mastermind behind the malware strains CypherRAT and CraxsRAT. These malicious tools are intended to provide attackers with remote access to victim devices, including control of cameras, microphones, and locations. EVLF, which operates as a malware-as-a-service (MaaS) architecture, provides CypherRAT and CraxsRAT to fellow cybercriminals, and it is estimated that during the last three years, around 100 separate threat actors have obtained lifetime licences for these tools. Since at least September 2022, EVLF has been running a web shop to market their creations, where CraxsRAT, one of the most dangerous RATs in the current Android threat landscape, allows threat actors to manipulate infected devices remotely from a Windows computer, and updates are released based on customer feedback. The CraxsRAT malware is built with a builder, which allows for customization, payload obfuscation, icon selection, app name, and the activation of desired features and permissions upon installation. Cyfirma stated that CraxsRAT has significant functionalities such as bypassing Google Play Protect, live screen viewing, and a command execution shell, and its 'Super Mod' feature makes it difficult for victims to uninstall the app (such as when the victim tries to uninstall, the page crashes). EVLF is renowned for distributing malware via its GitHub account; however, a few of them have been removed by Microsoft; nonetheless, EVLF's GitHub account remains online. Furthermore, on August 23, 2023, EVLF released a statement on their Telegram channel signalling the project's termination, most likely in response to the revelation of their operations.
A threat actor identified as Curly COMrades has exploited the built-in Microsoft Hyper?V hypervisor in Windows machines to deploy a minimalist Alpine Linux virtual machine (VM) hos...
Researchers have observed an active, multi-stage campaign delivering the ValleyRAT remote-access trojan (RAT) to Windows targets—frequently Chinese-language users and organisatio...
Security researchers have identified a new Remote Access Trojan, branded “EndClient RAT,” used in targeted campaigns against human-rights defenders. Attackers sign payloads wit...