The Rise of Malware “Meal Kits” Fuelling a Surge in Remote Access Trojan Campaigns

In the ever-evolving world of cybercrime, hackers constantly discover new ways to exploit vulnerabilities and gain unauthorized access to private systems. One alarming trend that has emerged recently is the growing availability and affordability of “malware meal kits.” Consequently, we have witnessed a surge in campaigns utilizing remote access Trojans (RATs) to infiltrate and compromise target systems. This article delves into the details of this escalating threat landscape, examining the tactics employed by cybercriminals, with a particular focus on the rise of the Parallax RAT.

Rise in availability of affordable malware “meal kits”

With the increasing demand for hacking tools and the proliferation of underground marketplaces, malware “meal kits” have become readily accessible for cybercriminals. These kits, available for less than $100, provide hackers with pre-packaged sets of tools to launch attacks. This affordability has democratized cybercrime, allowing even novice threat actors to easily enter the hacking arena.

Spike in Excel Files Infected with Parallax RAT

One notable manifestation of this surge in RAT campaigns is the prevalence of Excel files infected with the Parallax RAT. The malware, disguised as legitimate invoices, tricks unsuspecting users into opening the file, only to activate the hidden payload. HP Wolf Security has reported a significant increase in the use of such infected files, luring victims into launching the malware unknowingly.

Availability of Parallax RAT malware kits

Cybercriminals seeking to utilize the Parallax RAT need not possess advanced technical skills or create their own malware from scratch. Malware marketplaces on hacking forums now offer Parallax RAT kits for a mere $65 per month. The accessibility and affordability of such kits has attracted aspiring attackers, who can now launch sophisticated attacks without investing extensive effort or resources.

Targeting aspiring attackers with malware kits

Not limited to the Parallax RAT, cybercriminals have also been targeting less experienced attackers by distributing other malware kits, such as XWorm. These kits are often hosted on popular code-sharing platforms like GitHub and provide a simple and user-friendly interface for executing attacks. This strategy allows cybercriminals to exploit individuals looking to venture into the world of hacking, ultimately increasing the number of RAT-based campaigns.

Emergence of DiscordRAT 2.0 malware kit

Adding to the proliferation of RAT campaigns, the recent emergence of the DiscordRAT 2.0 malware kit has further demonstrated the growing sophistication of these attacks. This kit, designed to exploit vulnerabilities within the popular communication platform Discord, empowers hackers to gain unauthorized control over infected systems. Its capabilities highlight the ever-increasing range of vectors through which RATs can infiltrate and compromise networks.

Dominance of email-based threats in HP’s telemetry

HP’s telemetry data reveals that a staggering 80% of the threats observed during the quarter were email-based. This highlights the significance of email as a primary attack vector for campaigns utilizing RATs (Remote Access Trojans). Cybercriminals leverage social engineering tactics and disguised attachments to deceive unsuspecting users into executing malicious files, thereby granting them remote access to the target system.

Targeting inexperienced attackers in RAT campaigns

A concerning trend observed in RAT campaigns is the targeting of less experienced attackers. By utilizing increasingly sophisticated methods and tools, cybercriminals aim to recruit newcomers into their operations, exploiting their lack of knowledge and potentially turning them into unwitting accomplices. This strategy not only expands the cybercriminals’ reach but also serves as a breeding ground for future attacks.

Rise in popularity of Parallax RAT as a payload

The effectiveness and adaptability of Parallax RAT have caused it to quickly climb the ranks as a popular payload for cybercriminals. In HP’s telemetry data, it jumped from being the 46th most popular payload in Q2 to a concerning seventh in Q3. This rise implies that the capabilities and success rate of Parallax RAT in compromising systems have attracted a significant number of threat actors.

“Jekyll and Hyde” attack used in Parallax RAT campaign

To further complicate detection and prevention efforts, the Parallax RAT campaign employed a sophisticated “Jekyll and Hyde” attack technique. This approach involves presenting a benign facade, resembling legitimate files or documents, while concealing the malicious payload within. This obfuscation technique makes it challenging for users to detect the hidden attack, further increasing the effectiveness of RAT campaigns.

RATs identified as a growing threat in 2023

Malware researcher Arnold Osipov warns that RATs have become a significant and escalating threat in 2023. With the increasing availability of malware kits, the ease of launching attacks, and the constant innovation in attack techniques, RAT-based campaigns pose a persistent menace to organizations and individuals alike. Continuous vigilance, robust security measures, and user education are crucial in mitigating the risk posed by these intrusive threats.

As the availability and affordability of malware “meal kits” continues to increase, fueling the rise of remote access Trojan campaigns, individuals and organizations must remain vigilant in fortifying their cybersecurity defenses. The Parallax RAT, along with other emerging malware kits like DiscordRAT 2.0, represents a significant and growing threat in the cyber landscape. By bolstering cybersecurity efforts, fostering user awareness, and implementing proactive defense strategies, we can navigate this evolving threat landscape and safeguard against the perils posed by RAT-based attacks.

Explore more