The cybersecurity firm, Cyble researchers have found a new remote access trojan (RAT) dubbed Borat, which allows infected systems to be controlled remotely by the threat actors.
While this new trojan has been detected on darknet markets where the developers of this trojan offer several easy-to-use features to users for perming illicit activities or tasks like:-
- DDoS attacks
- UAC bypass
- Ransomware deployment
To perform specific features like the above ones that we have mentioned, this new trojan, Borat authorizes its operators to assemble the binary of the malware.
Key Features & Abilities of Borat
This trojan enables its operators to take over the control of the following of their targets:-
- System
- Hang the System
- Swap Mouse Buttons
- Keyboard
- Access files
- Network points
- Enable/Disable webcam light
- Hide any signs of their presence
- Remove traces
- Play Audio
- Show/hide the Desktop
- Blank screen
- Show/hide the taskbar
- Hold Mouse
- Monitor Off
By creating a small payload that includes precisely what the attacker…