October 9, 2015 By Douglas Bonderud 3 min read

There’s a new remote-access Trojan (RAT) sniffing around corporate systems. According to Threatpost, Israeli security firm enSilo came across the RAT inside a customer’s network, and while researchers aren’t sure how the Trojan nibbled its way through, they are certain it poses significant risk.

So far the new threat, named Moker, hasn’t been spotted anywhere else. But a combination of a sophisticated installation process and numerous attempts to deceive researchers with fake code make it a RAT worth studying. Here’s what the IT community knows so far.

Risky Rodents

RATs are a great end game for cybercriminals since they allow total control over a host system. Often, RATs aren’t the first thing on victimized machines. Instead, malware creators use phishing techniques and dubious email links as a jumping-off platform, convincing users to download small malware attachments that in turn contact host servers and let the RATs run free. Moker is different, since enSilo has never seen anything similar before and isn’t sure how the program made it onto corporate networks or where it’s sending exfiltrated data.

What do they know? Moker targets Windows machines and can bypass traditional protection methods such as antivirus solutions, sandboxing and virtual machines. Thanks to a clever exploit of the User Account Control (UAC) system, it can even override the need for admin permission to make system-level changes. The remote-access Trojan also takes step to elude capture: According to enSilo’s Senior Security Researcher Yotam Gottesman, the RAT’s detection avoidance measures “included encrypting itself and a two-step installation.”

What’s more, Moker evades analysis even after being caught by adding extraneous code and superfluous instructions designed to lead researchers in the wrong direction. Once active in a network, this RAT can sniff out data, take screenshots, record Web traffic, log keystrokes and even add new admin accounts. Put simply: It’s filthy, disease-ridden and could cause serious harm.

Bad Actors, Worse Networks?

There’s some hope on the horizon. enSilo has never seen this Trojan out in the wild and, with any luck, will reverse engineer the code enough that new versions of the same basic package won’t present so great a threat. And cybercriminals themselves may help the cause of stopping RATs in their tracks: According to eWEEK, they often “misconfigure their management nodes for commodity remote-access Trojans” by not changing default ports on the software.

More advanced attackers change the port to prevent detection, but as RATs become more common and available for free or a nominal fee, the number of home-brew attackers is on the rise. With ports left open, it’s easy for IT security pros to scan possible attack vectors, identify unique text strings and discover malicious IP addresses.

On the flip side is the Internet of Things. Silicon Republic noted that as the number of network-connected devices ramps up, so, too, does cybercriminals’ ability to cause total device failure. Attackers and security researchers have already caused Internet-enabled cars to stop mid-drive and medical drug pumps to change dosage without the approval of medical personnel.

Security firms are now starting to track massive RAT networks designed to compromise devices of all types and take complete control. With many of these devices already lacking basic security measures, something like Moker may not be necessary — the security maze is so simple that even the slowest, dumbest RATs have a chance to reach the virtual cheese.

The Moker RAT shouldn’t be surprising. As malware security advances, cybercriminals keep pace. For companies, there’s a simple takeaway: Total security is an illusion. No antivirus, sandbox or control mechanism is foolproof. They’re better used in unison, but active oversight — either in-house, from a third party or both — is necessary to catch these RATs before they memorize the maze.

More from

Working in the security clearance world: How security clearances impact jobs

2 min read - We recently published an article about the importance of security clearances for roles across various sectors, particularly those associated with national security and defense.But obtaining a clearance is only part of the journey. Maintaining and potentially expanding your clearance over time requires continued diligence and adherence to stringent guidelines.This brief explainer discusses the duration of security clearances, the recurring processes involved in maintaining them and possibilities for expansion, as well as the economic benefits of these credentialed positions.Duration of security…

White House cements CISA’s role as national coordinator for cybersecurity

2 min read - In 2013, the Obama Administration rolled out "The Presidential Policy Directive (PPD) on Critical Infrastructure Security and Resilience", a forerunner to the Cybersecurity and Infrastructure Security Agency (CISA), created "to strengthen and maintain secure, functioning and resilient critical infrastructure."The directive was groundbreaking in 2013, noting the importance of the rising risk of cyberattacks against critical infrastructure. But as cyber risks are constantly shifting, every cybersecurity program needs to be re-evaluated, and CISA is no exception. That’s why, in April 2024, President…

How a new wave of deepfake-driven cybercrime targets businesses

5 min read - As deepfake attacks on businesses dominate news headlines, detection experts are gathering valuable insights into how these attacks came into being and the vulnerabilities they exploit.Between 2023 and 2024, frequent phishing and social engineering campaigns led to account hijacking and theft of assets and data, identity theft, and reputational damage to businesses across industries.Call centers of major banks and financial institutions are now overwhelmed by an onslaught of deepfake calls using voice cloning technology in efforts to break into customer…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today