SpankRAT Exploits Windows Explorer Processes for Stealth and Delayed Detection

A newly identified two-component Remote Access Trojan (RAT) toolkit built in Rust, dubbed SpankRAT, is being used by threat actors to abuse legitimate Windows processes, bypass reputation-based security controls, and maintain persistent access to compromised environments while largely evading detection on VirusTotal. Researchers at ANY.RUN has identified and analyzed the SpankRAT toolkit, flagging it as […]

The post SpankRAT Exploits Windows Explorer Processes for Stealth and Delayed Detection appeared first on Cyber Security News.

This article has been indexed from Cyber Security News

Read the original article: