Select Page

Threat actors have been found using a previously undocumented JavaScript malware strain that functions as a loader to distribute an array of remote access Trojans (RATs) and information stealers.

HP Threat Research dubbed the new, evasive loader “RATDispenser,” with the malware responsible for deploying at least eight different malware families in 2021. Around 155 samples of this new malware have been discovered, spread across three different variants, hinting that it’s under active development.

“RATDispenser is used to gain an initial foothold on a system before launching secondary malware that establishes control over the compromised device,” security researcher Patrick Schläpfer said. “All the payloads were RATs, designed to steal information and give attackers control over victim devices.”

As with other attacks of this kind, the starting point of the infection is a phishing email containing a malicious attachment, which masquerades as a text file, but in reality is obfuscated JavaScript code programmed to write and execute a VBScript file, which, in turn, downloads the final-stage malware payload on the infected machine.

images from Hacker News