Live Training | What's New in Lumu Defender

Already have an account? Sign in

Sign in

Malware

S0334

DarkComet

Type

Remote Access Trojan (RAT)

Associated threat actors

APT36 (Transparent Tribe)

Key Capabilities

Provides complete control over a compromised system, enabling keystroke logging, webcam and microphone access, and file manipulation.

OS Targeted

Windows

IoCs on Maltiverse

Maltiverse provides updated IoCs for easy SIEM/SOAR/Firewall/EDR integration.

What is DarkComet?

DarkComet (S0334) is a Remote Access Trojan (RAT) that gives attackers complete control over a compromised system. Though created as a legitimate tool, it is widely abused for cyber-espionage and other crimes.

DarkComet is known for its user-friendly interface, making it popular with a range of threat actors. Its capabilities include a keylogger to steal credentials, accessing webcams and microphones for surveillance, and managing files on an infected computer.

How to Defend Against DarkComet?

Defending against DarkComet requires a focus on preventing the initial infection and detecting its command-and-control (C2) activity.

  • Be cautious with unsolicited emails and avoid downloading files from untrusted sources, which are common delivery vectors.
  • Keep all systems and security software patched to limit the vulnerabilities that can be exploited for initial access.
  • Deploy endpoint detection and antivirus to identify and block the execution of known RATs and their associated behaviors.
  • Use network detection (NDR) with integrated threat intelligence to spot and block DarkComet’s C2 communications.

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.