Just in:
Petrochemical Storm Clouds Gather Over Saudi Arabia // I’m still learning how to answer this question. In the meantime, try Google Search. // Moomoo and Nasdaq Announce Global Strategic Partnership // Gen Zs Trust User and Expert Insights on Shopee // Schneider Electric introduces new household EV charger ‘Schneider Charge’ – Offering HK$6,980 exclusive deal for the first 100 customers // Crypto Exchange Seeks Indian Return After Regulatory Hurdles // Why Is 18th Lok Sabha Election So Crucial To Indian Democracy? // Czar Workspace: a Modern Workspace Solutions in Dubai // Saadiyat Grove Set for Smart Transformation Through Aldar-Siemens Alliance // Electric Cars Get Refueled, Not Charged: Obrist HyperHybrid Ready for Production // On Its 100 Years Anniversary, LUX Aims to Change Feminine Identity With ‘In Her Name’ // Takeoff After Turbulence: Flydubai Restarts Operations at Dubai International Airport // Alaska Air Grounded Briefly Due to System Issue // Big Four Accounting Firm EY Makes Blockchain Play for Streamlined Contracts // A Bridge Between Deserts and Rainforests: UAE and Costa Rica Forge Economic Ties // KL Home Care Commits To Excellence Professional Maid Services For The Residents Of Hong Kong // The International Exhibition of Inventions in Geneva Reveals More than 40 Scientific and Technological Innovation Achievements from Hong Kong // Abu Dhabi Launches ‘Medeem’ Initiative to Promote Emirati Values in Marriage // QuickHR Honours Women Leaders with the Annual Woman of Excellence Award // AI Race Heats Up: Meta Unveils Powerful New Llama //

Mysterious cat-and-mouse-themed Trojan RAT is potentially dangerous, but its creators and purpose remain unclear

1493303209 cat and mouse 2

cat-and-mouse-2.jpg

The malware code contains references to Felis and Mus — Latin for ‘cat’ and ‘mouse’.


Image: Getty Images/iStockphoto

A sophisticated form of Trojan malware allows its highly-skilled creators to secretly take over an infected system — and it comes with self-updating capabilities that enable it to strengthen itself, fix bugs, or change what it looks like in order evade detection.

Once it has infected a system, the Felismus Remote Access Trojan (RAT) is capable of easily gaining new functionalities in order to achieve the goals of the attackers deploying it — espionage, keylogging, traffic analysis, further malware deployment, and more.

ADVERTISEMENT

Initially discovered by Forcepoint, Felismus allows attackers to take complete control of an infected system, but its purpose remained something of a mystery. Now cybersecurity researchers at AlienVault have unveiled some of what they describe as the “devastating” intentions of this stealthy malware.

Named Felismus because of a reference to Tom & Jerry in its only human-readable encryption key (Felis is Latin for ‘cat’ and Mus is Latin for ‘mouse’), the malware appears to be primarily designed for espionage. While the identity of the victims — and indeed the perpetrators — remains a mystery, its scarcity in the wild suggests that it’s only being used for highly targeted attacks.

Cat burglar

Felismus infiltrates systems by posing as an Adobe Content Management System file, with the malicious file presented as “AdobeCMS.exe”. Like many other forms of malware, the distribution method for this is most likely to come in a phishing email campaign, encouraging the victim to download what they’re led to believe is an Adobe update.

Once run on the target system, Felismus camouflages itself as a Windows process by registering a WindowProc function, allowing the window to secretly accept and process messages with the malware’s command-and-control server — all while disguised as normal activity.

This capability to look ‘normal’ makes Felismus particularly dangerous, as it enables the malware to avoid detection by antivirus programmes and the attackers to stealthily execute commands.

While this in itself poses a “significant threat”, says AlienVault, it only scrapes the surface of the Felismus’s dangers. Its modular construction allows it to hide and even extend its nefarious capabilities, essentially allowing the attackers to do anything they want in terms of monitoring, sabotaging, or stealing data.

The highly skilled nature of the threat actors behind Felismus, and their ability to cover their tracks, means that no-one knows their identity or their target. However, the malware doesn’t appear to be linked to any known campaigns.

Researchers have pointed to some clues that could lead to the identification of the attackers, though. Spelling errors in the malware construction indicate that English may not be the perpetrators’ first language, while the antivirus processes it’s built to detect feature vendors that predominantly operate in China.

Felismus was only discovered recently, but researchers say it appears to have been active for at least six months. The fact that it has been carefully constructed to avoid discovery has helped it remain hidden and carry out its criminal operations — whatever they may be, or may become.

READ MORE ON CYBERCRIME

(via PCMag)

ADVERTISEMENT

ADVERTISEMENT
Just in:
Malaysian traders to access the dynamically evolving Octa trading ecosystem // Crypto Exchange Seeks Indian Return After Regulatory Hurdles // Tech Giant Discharges Workers Following Disruptive Protest // UAE Delegation Engages in Arab Parliament Committee Discussions // QuickHR Honours Women Leaders with the Annual Woman of Excellence Award // Alaska Air Grounded Briefly Due to System Issue // DFA Hong Kong Young Design Talent Award 2024 // Takeoff After Turbulence: Flydubai Restarts Operations at Dubai International Airport // I’m still learning how to answer this question. In the meantime, try Google Search. // Gen Zs Trust User and Expert Insights on Shopee // AI Race Heats Up: Meta Unveils Powerful New Llama // KL Home Care Commits To Excellence Professional Maid Services For The Residents Of Hong Kong // The International Exhibition of Inventions in Geneva Reveals More than 40 Scientific and Technological Innovation Achievements from Hong Kong // Big Four Accounting Firm EY Makes Blockchain Play for Streamlined Contracts // Keung To Trams Return! “KeungShow HKFanClub” Sponsor Free Tram Rides for All on 30 April to Celebrate Keung To’s 25th Birthday // Electric Cars Get Refueled, Not Charged: Obrist HyperHybrid Ready for Production // Navigating Business Setup in Dubai: A Comprehensive Guide by Czar Bizserv // VT Markets Releases Study on Upcoming Bitcoin Halving and Market Implications // Saadiyat Grove Set for Smart Transformation Through Aldar-Siemens Alliance // On Its 100 Years Anniversary, LUX Aims to Change Feminine Identity With ‘In Her Name’ //