Live Training | What's New in Lumu Defender

Already have an account? Sign in

Sign in

Malware

S0379

Revenge RAT

Type

Remote Access Trojan (RAT)

Associated threat actors

Various

Key Capabilities

Provides access and extensive control, enabling keystroke capturing, screen capturing, audio and video recording, and file access.

OS Targeted

Windows

IoCs on Maltiverse

Maltiverse provides updated IoCs for easy SIEM/SOAR/Firewall/EDR integration.

What is Revenge RAT?

Revenge RAT (S0379) is a Remote Access Trojan (RAT) that gives attackers extensive control over a victim’s computer. Operating stealthily, it often evades detection by security software.

The main danger of Revenge RAT is its use as a keylogger for data theft, allowing attackers to capture login credentials and financial information. It can also spy on victims by taking screenshots, recording audio and video, and accessing their files.

How to Defend Against Revenge RAT?

Defending against Revenge RAT requires preventing the initial infection and detecting its command-and-control (C2) activity.

  • Be cautious with email attachments and links, as phishing is a primary delivery vector for this RAT.
  • Keep the operating system and all applications patched to limit the vulnerabilities that can be exploited for initial access.
  • Deploy endpoint detection and antivirus to identify and block the execution of known RATs and their associated behaviors.
  • Use network detection (NDR) with integrated threat intelligence to spot and block Revenge RAT’s C2 communications.

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.