Researchers spotted a phishing campaign delivering a multi-feature, open-source remote administration tool known as Babylon RAT.

Cofense observed that the Babylon RAT samples distributed in this campaign were written in C# and came with an administration panel written in C++. This control feature allows the malware to manage multiple server configuration options around port numbers, network keys for authentication and IP versions. Together, these features enable digital attackers to customize the malware according to their needs.

A deeper analysis of the campaign revealed that the initial command-and-control (C&C) server connection that was made after execution came hardcoded in the binary. Cofense reasoned that this tactic allowed for the campaign to change IP addresses without interruption, thereby bolstering the attack’s resilience against takedown attempts. Simultaneously, the C&C connection contained fingerprinting data about the infected host, including IP address, username and operating system version.

The malware delivered in this campaign was also capable of using two different C&C domains for redundancy, deploying a password recovery module for harvesting credentials and conducting denial-of-service (DoS) attacks from the infected host.

Peering Into the History of Babylon RAT

Over the past few years, researchers have discovered multiple instances in which Babylon RAT appeared in attack campaigns or infrastructure with links to other malware. Back in 2017, for instance, Palo Alto Networks found a nest of contextually linked C&C domains that were predominantly dynamic DNS. These domains distributed Babylon RAT along with other threats such as DarkComet, DarkTrack and LuminosityLink. A year later, Kaspersky Lab discovered a malicious campaign leveraging Babylon, AZORult and other malware to target industrial enterprises.

How to Defend Against Phishing-Borne Malware

Security professionals can help defend their organizations against phishing-borne malware by using ahead-of-threat detection to spot and prevent employees from connecting to potentially malicious domains before they become active. Organizations should also use a unified endpoint management system to monitor the behavior of all endpoints for unapproved third-party connections, which could be indicative of a malware infection.

More from

Is It Time to Start Hiding Your Work Emails?

In this digital age, it is increasingly important for businesses to be aware of their online presence and data security. Many companies have already implemented measures such as two-factor authentication and strong password policies – but there is still a great deal of exposure regarding email visibility. It should come as no surprise that cyber criminals are always looking for ways to gain access to sensitive information. Unfortunately, emails are a particularly easy target as many businesses do not encrypt…

2022 Industry Threat Recap: Finance and Insurance

The finance and insurance sector proved a top target for cybersecurity threats in 2022. The IBM Security X-Force Threat Intelligence Index 2023 found this sector ranked as the second most attacked, with 18.9% of X-Force incident response cases. If, as Shakespeare tells us, past is prologue, this sector will likely remain a target in 2023. Finance and insurance ranked as the most attacked sector from 2016 to 2020, with the manufacturing sector the most attacked in 2021 and 2022. What…

X-Force Prevents Zero Day from Going Anywhere

This blog was made possible through contributions from Fred Chidsey and Joseph Lozowski. The 2023 X-Force Threat Intelligence Index shows that vulnerability discovery has rapidly increased year-over-year and according to X-Force’s cumulative vulnerability and exploit database, only 3% of vulnerabilities are associated with a zero day. X-Force often observes zero-day exploitation on Internet-facing systems as a vector for initial access however, X-Force has also observed zero-day attacks leveraged by attackers to accomplish their goals and objectives after initial access was…

And Stay Out! Blocking Backdoor Break-Ins

Backdoor access was the most common threat vector in 2022. According to the 2023 IBM Security X-Force Threat Intelligence Index, 21% of incidents saw the use of backdoors, outpacing perennial compromise favorite ransomware, which came in at just 17%. The good news? In 67% of backdoor attacks, defenders were able to disrupt attacker efforts and lock digital doorways before ransomware payloads were deployed. The not-so-great news? With backdoor access now available at a bargain price on the dark web, businesses…