Budget-priced RAT is surprisingly effective tool for hackers, say BlackBerry researchers

Share post:

One of the reasons the number of cyberattacks keeps escalating is the cost of hacking tools for threat actors keeps dropping. Software-as-a-service offerings are common, but some crooked developers keep the price of their tools low. According to researchers at BlackBerry, one is an inexpensive remote access trojan (RAT) that has been primarily sold on Russian language underground forums for over two years. Called DarkCrystal RAT (or DCRat for short), it’s a “surprisingly effective homemade tool for opening backdoors on a budget,” they said. “DCRat is one of the cheapest commercial RATs we’ve ever come across,” the researchers said in a blog released on Monday. “The price for this backdoor starts at 500 RUB (less than US$6) for a two-month subscription, and occasionally dips even lower during special promotions. No wonder it’s so popular with professional threat actors as well as script kiddies.” The blog is a backgrounder on the trojan, which includes details and indicators of compromise that threat hunters could find valuable. DCRat appears to have been developed and maintained by a single person going by the pseudonyms of “boldenis44,” “crystalcoder,” and Кодер (“Coder”), the researchers said. It includes a keylogger, and can also steal browser cookies, browser stored passwords, browser stored form content , stored credit cards (via Windows DPAPI & Chrome SQLite Database), clipboard contents, Discord tokens and more. There are also plugins available that enable data exfiltration/credential stealing, system manipulation and cryptocurrency mining. It also includes what BlackBerry calls primitive, multi-threaded code to perform different forms of denial of service attacks – including HTTP(S) POST, UDP and TCP – to a specific host and endpoint combination. DCRat’s modular architecture and bespoke plugin framework make it a very flexible option, the researchers said, helpful for a range of nefarious uses. This includes surveillance, reconnaissance, information theft, DDoS attacks, as well as dynamic code execution in a variety of different languages. Affiliates can generate their own client plugins, which can be downloaded and used by subscribers. The DCRat product itself consists of three components:
  • a stealer/client executable;
  • a single PHP page, serving as the command-and-control (C2) endpoint/interface;
  • an administrator tool. The administrator tool is a standalone executable written in the JPHP programming language, an obscure implementation of PHP that runs on a Java virtual machine.
The administrator tool and the backdoor/client are regularly updated with bug fixes and new features. During recent months, the researchers have often seen DCRat clients being deployed with the use of Cobalt Strike beacons through the Prometheus TDS (traffic direction system). Prometheus is a subscription-based malware service that has been used in many high-profile attacks, the blog says, including campaigns against U.S. government institutions in 2021. “The biggest, flashiest threat groups might get their name in lights, but they aren’t necessarily the cybercriminals that keep security practitioners up at night,” said BlackBerry. “Miscreants with too much time on their hands can often cause just as much hassle.” The post Budget-priced RAT is surprisingly effective tool for hackers, say BlackBerry researchers first appeared on IT World Canada.
Howard Solomon
Howard Solomonhttps://www.itworldcanada.com
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times.

SUBSCRIBE NOW

Related articles

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Cyber Security Today, May 15, 2024 – Ebury botnet still exploits Linux servers, Microsoft, SAP and Apple issue security updates

The Ebury botnet continues to exploit Linux servers, Microsoft, SAP and Apple issue security updates, and more. Welcome to...

Employee errors still predominant cause of data breaches: Verizon Report

In the latest 2024 Verizon Data Breach Report (DBIR), it has been revealed that employee errors remain the...

Black Basta has compromised over 500 organizations globally:CISA

The Cybersecurity and Infrastructure Security Agency (CISA) along with the FBI reported that the Black Basta ransomware group...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways