Live Training | What's New in Lumu Defender

Already have an account? Sign in

Sign in

Malware

S0253

RunningRAT

Type

Remote Access Tool (RAT)

Associated threat actors

Hades (a threat group that researchers attribute the 2018 PyeongChang Winter Olympics cyberattacks to)

Key Capabilities

Provides remote access to targeted systems for remote control and data exfiltration.

OS Targeted

Windows

IoCs on Maltiverse

Maltiverse provides updated IoCs for easy SIEM/SOAR/Firewall/EDR integration.

What is RunningRAT?

RunningRAT (S0253) is a Remote Access Tool (RAT) identified in cyber operations targeting the 2018 PyeongChang Winter Olympics. This malware was used to gain remote access to systems, often alongside other malware like Gold Dragon and Brave Prince. Once installed, RunningRAT provides its operators with the ability to control the infected machine, exfiltrate data, and conduct espionage.

How to Defend Against RunningRAT?

Defending against RATs like RunningRAT requires a focus on preventing the initial infection and detecting its C2 communications.

  • Be vigilant about phishing attempts, especially those themed around major global events.
  • Keep all systems and software patched to limit the vulnerabilities that can be exploited for initial access.
  • Deploy endpoint detection and antivirus solutions to identify and block the execution of known RATs and their associated behaviors.
  • Use network detection (NDR) with integrated threat intelligence to spot and block C2 communications from targeted malware campaigns.

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.