Nerbian RAT, a new threat to the cybersecurity; be alert!

Nerbian RAT, a new remote-access trojan written in the Go programming language has been spotted targeting businesses in Italy, Spain, and the U.K.

The newly identified Nerbian RAT malware supports various anti-analysis components. Consequently, these components are spread across various stages, including multiple open-source libraries.

In the operating system (OS), Go programming language is compiled into 64-bit systems. It supports several encryption routines so as to evade the network analysis further.

The messages, less than 100 in number were claimed to be from the World Health Organization. Consequently, it was about the safety measures related to COVID-19. This messages included the victims latest health advice in a macro-laced Microsoft Word document. Also, it had guidance related to Covid-19, including steps for self-isolation.

Trojan was provided mainly to log keystrokes, capture screenshots, and carry out arbitrary commands. Apparently, both of the remote access been developed by the same author, the person who created this threat is still unknown. However, it is said that the malware could be customized and can be used for future attacks. Although now, it can only take over the Nerbian RAT.




Readers like you help support The Tech Outlook. When you make a purchase using links on our site, we may earn an affiliate commission. We cannot guarantee the Product information shown is 100% accurate and we advise you to check the product listing on the original manufacturer website. Thetechoutlook is not responsible for price changes carried out by retailers. The discounted price or deal mentioned in this item was available at the time of writing and may be subject to time restrictions and/or limited unit availability. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates Read More

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

function init() { var vidDefer = document.getElementsByTagName('iframe'); for (var i=0; i