NanoCore RAT

NanoCore RAT


Researchers at Symantec have found a brand new and coming RAT (Remote Access Tool), that is freely obtainable in black market and cybercriminals area unit able to do their hands dirtyexploitation it to the fullest. the newest RAT known as NanoCore, known as Trojan.Nancrat by Norton, was antecedently obtainable in underground market at a value of twenty five USD. howevera report reveals that the a cracked version of the NanoCore RAT is currently obtainable freely.

Symantec emphatic on “humans tendency to incline towards FREE things”. Hackers or around the bend we are saying, or specifically speaking the dangerous actors World Health Organization area unit concerned in cybercrimes – the cybercriminals, are humans, and thence this truth applies toidentical.

NanoCore RAT


The Target

On the Hitlist of NanoCore RAT authors appears to be is that the Energy Sector. Earlier this monthonce the total version of NanoCore (1.2.2.0) was leaked, it once more showed an increase in increase of its usage. The RAT is found to be wildly exported within the computer network spacetouching traditional users with the utilization of straightforward Email Trick to lure user transfer the trojan file, ending in compromise of security and privacy.

“One example we tend to found of NanoCore getting used in an exceedingly targeted attackconcerned a spam run that started on March half-dozen. The targeted emails area unit being sent to energy corporations in Asia and therefore the {middle east|Middle East|Mideast|Near East|geographical area unita|geographic area|geographical region|geographic region} and therefore the cybercriminals behind the attack are spoofing the e-mail address of a legitimate company inRepublic of Koreaconnected to the e-mail may be a malicious RTF file that exploits the Microsoft Windows Common managements ActiveX Control Remote Code Execution Vulnerability (CVE-2012-0158) and drops Trojan.Nancrat.”, the report elaborated.
NanoCore RAT

Detections Worldwide


Symantec free an exquisite Infographic mentioning the detections of NanoCore RAT Worldwide overtotally different versions of the cracked NanoCore RAT free. NanoCore detections aren't confined to specific countries however cowl countries right across the world


It was noticed on every occasion the author tries to develop and improve NanoCore, one in all the purchasers invariably finishes up unseaworthy a duplicate of it without charge. This sure enoughmust be a significant deterrence for the first developer however they appear to possess endless optimism and persist to make new versions with increased capabilities, perhaps within the hope that eventually enough customers pays.

NanoCore RAT

The higher than graph clearly depicts the increase within the use of NanoCore RAT over the past months with the discharge of its cracked versions. this may be seen following the multiple leaks of version one.0.3.0 in March and Apr, version 1.1.0.7 in Gregorian calendar month and August, version 1.1.0.10 in Octand eventually the foremost recent leak of version one.2.2.0 in March.

Talking regarding the long run of the RAT, Symantec researchers expect additional detectionswithin the returning weeks owing to a modern leak of the total version. As earlier aforementioned, the cracked version is offered freely on visible net, surpassing the boundaries of dark net.

“That suggests that it’s not simply the undergone cybercriminals World Health Organization willsimply access this malware without chargehowever conjointly script kiddies desperate to begintheir cybercriminal careers. The additional the NanoCore malware is employed and is visible on the underground, the upper the probabilities that in the future it's going to find yourself even as well-known as a number of the ill-famed RATs that have precede it. The question is, can the developerbuild the money that they supposed to in developing NanoCore or will success solely comes at the expense of lost revenue owing to piracy?” queries the report.




Download link: http://sh.st/f6pwQ


Video link: http://youtu.be/swXZ1I6mAgY