Fake Amnesty International Scanner Used to Infect Windows

Share post:

Threat actors are now using Sarwent, a malware that mimics Amnesty International’s legitimate scanner, to scan systems for traces of Pegasus and remove them to infect Windows.

While the tactics of previous campaigns remain unclear, researchers at Cisco Talos recently announced a new attack when the malware was delivered via a fake Amnesty International website promoting Anti-Pegasus AV.

Based on an investigation that examined the administration panel of a Sarwent Command and Control server, the malware mainly reached users in the U.K.

Further research shows that Sarwent, written in Delphi, has remote access tool and allows direct access to the machine by activating the Remote Desktop Protocol or the Virtual Network Computing system.

According to researchers at Cisco Talos, the graphical user interface that Sarvent masquerades as an antivirus solution gives a clear indication that the threat actor behind the malware already has access to its source code.

For more information, read the original story in Bleeping Computer.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday, March 1, 2024

This episode features a discussion on how hard it is to kill a ransomware gang, Canada's proposed new online harms bill, why organizations still allow staff to use vulnerable software

Healthcare sector “stretched thin” in fight against cyber attacks warns CSO of Health-ISAC

In an interview Errol Weiss talks about the challenges facing hospitals a

Cyber Security Today, March 1, 2024 – Warnings to GitHub users and Ivanti gateway administrators, and more

This episode reports on a recommendation that enterprises drop Ivanti Policy Secure and Connect Secure devices because threat actors can get around mitigations for recent vulne

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways