Select Page

An unknown threat actor has been targeting Russian entities with a newly discovered remote access trojan called Woody RAT for at least a year as part of a spear-phishing campaign.

The advanced custom backdoor is said to be delivered via either of two methods: archive files or Microsoft Office documents leveraging the now-patched “Follina” support diagnostic tool vulnerability (CVE-2022-30190) in Windows.

Like other implants engineered for espionage-oriented operations, Woody RAT sports a wide range of features that enables the threat actor to remotely commandeer and steal sensitive information from the infected systems.

“The earliest versions of this RAT were typically archived into a ZIP file pretending to be a document specific to a Russian group,” Malwarebytes researchers Ankur Saini and Hossein Jazi said in a Wednesday report.

“When the Follina vulnerability became known to the world, the threat actor switched to it to distribute the payload.”

images from Hacker News