Attackers target Russian organizations with the new Woody RAT malware

On Wednesday, Hackers attacks Russian organizations with the newly discovered malware, allowing them to take control and steal information from compromised devices remotely.

According to Malwarebytes, one of the Russian organizations which were targeted using this malware is a government-controlled defense corporation.

The Malwarebytes Labs researchers said that on the basis of a fake domain registered by the hackers, they know that they tried to attack a Russian aerospace and defense entity known as OAK.

Dubbed Woody Rat, this remote access trojan (RAT) has a wide range of capabilities. It has been used in attacks for at least a year.

It is currently delivered onto targets’ computers through phishing emails from two distribution methods, ZIP archive files having the malicious payload or Information security memo Microsoft Office documents that exploit the Follina vulnerability to withdraw the payloads.

The researchers further said that the earliest versions of this malware were typically archived into a zip file that pretended to be a document specific to a Russian group.

According to Bleeping Computer, Its list of features involves collecting system information, listing folders and running processes, executing commands and files received from its command-and-control (C2) server, downloading, uploading, and deleting files on infected machines, and taking screenshots.

Readers like you help support The Tech Outlook. When you make a purchase using links on our site, we may earn an affiliate commission. We cannot guarantee the Product information shown is 100% accurate and we advise you to check the product listing on the original manufacturer website. Thetechoutlook is not responsible for price changes carried out by retailers. The discounted price or deal mentioned in this item was available at the time of writing and may be subject to time restrictions and/or limited unit availability. Amazon and the Amazon logo are trademarks of, Inc. or its affiliates Read More


This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More