Quasar RAT is a type of malware, or malicious software, that is designed to exploit and damage computer systems. It can infiltrate systems through various channels such as suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal personal information, disrupt operations, or even hold data hostage for ransom. Quasar RAT has been observed in use alongside other malware samples like Remcos RAT, with both using the same beacon IP addresses. Additionally, there have been instances where a MoonPeak server was seen connecting with a known Command & Control (C2) server for Quasar RAT, a tool associated with the Kimsuky group, indicating its widespread usage among threat actors.
In some cases, threat actors have modified versions of Quasar RAT for specific attacks. For instance, a version of Quasar RAT was altered to steal financial credentials, repurposing this espionage tool into a banking Trojan aimed at customers of financial institutions in Colombia. This demonstrates the flexibility and adaptability of Quasar RAT, allowing cybercriminals to tailor its functionality to suit their objectives.
Quasar RAT has also been involved in phishing campaigns targeting organizations in the U.S. and India. The MULTI#STORM phishing campaign used a multi-stage attack chain that culminated in the deployment of various Remote Access Trojans (RATs), including Quasar RAT. These attacks highlight the global reach of this malware and its prevalence in sophisticated cyberattacks. In response to these threats, cybersecurity firms have been actively investigating and countering attacks involving Quasar RAT, such as the ones against Ukrainian targets earlier this year.
Description last updated: 2024-11-21T10:47:10.418Z