SideWinder Launches Attacks on South Asia’s Government and Critical Systems
May 28, 2025ICS: Mitsubishi Electric MELSEC iQ-F Series Vulnerability
May 29, 2025SideWinder Launches Attacks on South Asia’s Government and Critical Systems
May 28, 2025ICS: Mitsubishi Electric MELSEC iQ-F Series Vulnerability
May 29, 2025Severity
High
Analysis Summary
Gh0st RAT is a remote access trojan (RAT) that was first discovered in 2008. It is known for its ability to give an attacker complete control over an infected computer, including access to the victim's files, webcam, microphone, and keystrokes. Gh0st RAT is often used in targeted attacks against government and commercial organizations and has been linked to several APT (advanced persistent threat) campaigns. The malware is delivered via a phishing email or by exploiting vulnerabilities in software. Once installed, Gh0st RAT establishes a connection with a command and control server, through which the attacker can issue commands to the infected machine. Some variants of Gh0st can be used to install cryptocurrency miners and/or various trojan-type programs. Cybercriminals use these controls over the infected computer to access the victim's bank account and transfer money without authorization. It is important to keep software up to date and be cautious of phishing emails to prevent infection by Gh0st RAT or other RATs.
Impact
- Unauthorized Access
- Sensitive Information Theft
- File Manipulation
- Remote Command Execution
Indicators of Compromise
MD5
968dfe97180c7528cc4f611dd2427bd9
0bf73b8525fbdec4e746d16573068653
cad992e5f81ace5062843424ae343dcd
SHA-256
32278411dc9d8e54b5802428e955f64cefcd21cbf86821388785b86f83dbd54e
8760eb5021ee676dcf3b8f4357273efd3fa43f506292b23b63d4695727f3c424
96a09332b1e9711a8e8d24efc122b172fc8d26ab9c2fc6991ab0ff5766ea6aa8
SHA1
4fb061438579af03c832b3d09d2f1605a7029612
40897f999cb809aec7fcfccb420a0fbf110aa00f
c34db6cd365b3a3ee6c6f3000de6dc04116af509
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.
- Patch and upgrade any platforms and software timely and make it into a standard security policy.