Old Cardinal RAT Malware Resurrects Through Series Of Updates

- Advertisement -

Israeli tech companies, beware: This malware family is back after two years in hiding.

A type of malware family not seen since 2017 has resurfaced and is targeting FinTech and cryptocurrency companies in Israel, according to a March 19 blog post from cybersecurity watchdog Unit 42.

The previous version of the malware family, dubbed Cardinal RAT, employed the Carp Downloader, which uses “malicious macros in Microsoft Excel documents to compile embedded C# (C Sharp) Programming Language source code into an executable that in turn is run to deploy the Cardinal RAT malware.”

According to Unit 42, the new version of the Cardinal RAT malware comes with updates and modifications that “evade detection and hinder analysis.” This version of Cardinal RAT uses a variety of obfuscation techniques, including hiding malicious code in in a bitmap file. Once the victim opens the file, the malware is decrypted and begins to infect the victim’s computer.

Unit 42 confirmed the updated version of Cardinal RAT infects the victim’s computer by collecting victim information, updating settings, acting as a reverse proxy, executing a command, uninstalling itself, recovering passwords, downloading and executing new files, keylogging, capturing screenshots, and cleaning cookies from browsers.

According to The Next Web, in addition to nine reports from Israel of Cardinal RAT Malware attacks, there have been two in the US and one in both Japan and Austria. To protect one’s personal data from malware attacks, Unit 42 suggests that individuals and companies beef up their spam filters and parental controls to “restrict use of scripting languages by malware” and not open or even allow “inbound e-mails with LNK file as attachments [or] … e-mails from external sources where the documents contain macros.”

- Advertisement -

Although the Cardinal RAT malware was silent for two years, there have been quite a few malware attacks targeting the personal data of people and companies. Just last month, cybersecurity firm ESET announced it discovered malware created to steal crypto wallet addresses and personal keys infecting the Google Play store.

Nathan Graham is a full-time staff writer for ETHNews. He lives in Sparks, Nevada, with his wife, Beth, and dog, Kyia. Nathan has a passion for new technology, grant writing, and short stories. He spends his time rafting the American River, playing video games, and writing.

Like what you read? Follow us on X @Bitnewsbot to receive the latest Cardinal RAT, Carp Downloader or other Ethereum ecosystem news.

- Advertisement -



Previous Articles:

Stay in the Loop

Get exclusive crypto insights, breaking news, and market analysis delivered straight to your inbox. No fluff, just facts.

    1 Email per day. Unsubscribe at any time.

    - Advertisement -

    Latest News

    Embargo Ransomware Tied to $34M Crypto Hits US Hospitals, Pharma

    Embargo, a new Ransomware group, is responsible for over $34 million in crypto ransom...

    Michael Saylor Unfazed by Ether Surge, Remains Laser-Focused on BTC

    Michael Saylor remains focused on Bitcoin despite increasing interest in Ether and other digital...

    Chainlink Surges 15%; Analysts Predict New All-Time High for LINK

    ChainLink (LINK) rose over 15% in the past week, driving renewed price forecasts. Analysts expect...

    Nyan Cat Creator Claims $700K in Royalties Amid Meme Coin Boom

    Chris Torres, the creator of Nyan Cat, has received nearly $706,000 in royalties from...

    Shiba Inu Burn Rate Soars 3,464%, Ignites Major Price Rally

    Shiba Inu's burn rate rose by over 3,460% in 24 hours, leading to 9.8...

    Must Read

    Buy Domain With Bitcoin: Top 8 Domain Registrars That Accept Bitcoin And Crypto

    You are here because you want to buy a domain with bitcoin, right? If you are looking for domain registrars that accept bitcoin or...