Saturday, March 25, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Remote Access Trojan (RAT) detection with Wazuh

Remote Access Trojan (RAT) detection with Wazuh

In this article, you'll find some details about remote access trojans, which can stay undetected for a long period, and how Wazuh detects them.


Rusen Gobel Rusen Gobel
March 14, 2023
4 min read

Remote access trojans (RATs) are malware that allows threat actors to take full remote control of infected endpoints. RATs disguise as legitimate software or are delivered through phishing emails. When a RAT infects an endpoint, it automatically establishes communication with a command and control (C2) server. One of the key features of a remote access trojan is executing a set of commands it receives from its C2 server on the infected endpoint. Also, it can send data back to the C2 server.

Table of Contents

  • Common capabilities of RATs
  • How remote access trojans infect endpoints
  • Impact of remote access trojan attacks on organizations
  • How Wazuh detects remote access trojan attacks
    • File integrity monitoring
    • Vulnerability detection
    • Command monitoring
  • Conclusion

Common capabilities of RATs

  1. Threat actors use RATs to steal sensitive information from browsers and email clients on infected endpoints. This malware also allows threat actors to log the keystrokes of users on infected endpoints. The RAT then sends the stolen information to a C2 server.
  2. Threat actors use remote access trojans to mine Bitcoin and other cryptocurrencies on infected endpoints. A threat actor group known as Panda has earned a high amount of dollars in cryptocurrency by spreading RATs across multiple devices.
  3. RATs can delete, create or modify files on infected endpoints. They can also download malicious files to assist in their malicious activities.
  4. RATs can distribute viruses and other types of malware. For example, RATs can be used to launch ransomware.
  5. Threat actors can deploy RATs on many infected endpoints and use these endpoints to launch distributed denial of service (DDoS) attacks on target servers.
  6. Threat actors use RATs to control infected endpoints remotely. For example, a RAT can receive commands from a C2 server and execute such commands on the infected endpoint.

How remote access trojans infect endpoints

Remote access trojans infect endpoints through phishing emails, malware posing as legitimate programs, malicious web links, and unpatched vulnerabilities. Threat actors can also install a RAT after gaining physical access to an endpoint.

Impact of remote access trojan attacks on organizations

Remote access trojan attacks can have devastating impacts on organizations in the following ways:

  1. Access to sensitive information and loss of customer confidence: Customer data like credit cards, bank accounts, and personal identifiable information are usually stored on computer systems. Threat actors can infect these systems with RATs to steal customer information and then use this stolen information to commit crimes. When customers discover that an organization’s compromised systems were responsible for a data leak, they lose trust in the organization.
  2. Financial consequences: Organizations are faced with the cost of legal actions, damages, or regulatory fines when threat actors compromise their customers’ information due to a trojan attack.
  3. Disruption to business operations: A remote access trojan can disrupt an organization’s business operations by modifying or deleting data needed to perform such operations.

How Wazuh detects remote access trojan attacks

Remote access trojan attacks usually involve several malicious activities being performed on infected endpoints. These activities may include manipulating files, making changes to Windows registries, recording users’ keystrokes, and installing additional malicious software. Wazuh has out-of-the-box capabilities that can detect all these activities in near real-time.

Wazuh is a free and open source enterprise-ready security solution that provides unified SIEM and XDR protection across several workloads. It provides a centralized view for threat detection and security monitoring across virtualized, on-premises, cloud-based, and containerized environments.

Wazuh offers several capabilities that organizations can implement to prevent, detect and respond to security threats. This section highlights several Wazuh capabilities that offer protection against remote access trojan attacks.

File integrity monitoring

The File Integrity Monitoring (FIM) module monitors an endpoint’s files and directories. It triggers an alert when there is a file creation, modification, or deletion. The Wazuh FIM module stores the cryptographic checksum and other attributes of files and Windows registry keys to detect when there is a change in those values. Monitoring of files, directories, and Windows registries is done periodically or in near real-time.

Most remote access trojan attacks involve file creation, modification, or deletion. The Wazuh FIM module is used to detect when these files are created, modified, or deleted. The FIM module can be integrated with VirusTotal and YARA to scan for malicious files on endpoints. For example, in this blog post, we demonstrate how the Wazuh FIM module is used to detect STRRAT malware. Figure 1 below shows the detection of STRRAT malware with the Wazuh FIM module.

Figure 1: Wazuh FIM module detects a remote access trojan

Vulnerability detection

Vulnerability detection is the process of identifying security weaknesses in the operating system and applications installed on monitored endpoints. Wazuh uses the Vulnerability Detector module to detect vulnerabilities on monitored endpoints. The Wazuh Vulnerability Detector module can discover unpatched vulnerabilities on endpoints that remote access trojans can exploit. Wazuh builds a global vulnerability database from publicly available Common Vulnerabilities and Exposures (CVE) repositories. Wazuh then uses this database to cross-correlate the application inventory data collected from monitored endpoints to detect vulnerable software.

Command monitoring

Wazuh has a command monitoring module that monitors the output of specific commands that are executed on monitored endpoints. Remote access trojan attacks involve the execution of a set of commands on infected endpoints. The Wazuh command monitoring module can be used to monitor the output of commands executed by RATs. As demonstrated in this blog post, the Wazuh command monitoring module detected a Windows-scheduled task called Skype, created by STRRAT malware. The screenshot below shows the detection of the Windows scheduled task with the command monitoring module.

Figure 2: Wazuh command monitoring module detects a remote access trojan

Conclusion

Remote access trojans usually run as legitimate applications and can stay undetected in organizations for an extended period of time when they fail to implement adequate security solutions. The impact of remote access trojan attacks is highly devastating to organizations. Because of this, organizations must effectively detect remote access trojan attacks. This can be attained by leveraging various capabilities of Wazuh.

Wazuh is a free and open source XDR solution with several modules for cyber threat detection and response. Wazuh integrates seamlessly with third-party solutions and technologies. Wazuh also has an ever-growing community where users are supported.

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Tags: Wazuh
Rusen Gobel

Rusen Gobel

Rusen Gobel is the managing editor of Cloud7. With more than 10 years of experience, Rusen worked as a hardware and software news editor for technology sites such as ShiftDelete, Teknokulis, Hardware Plus, BT Haber. In addition, Rusen publishes consumer product reviews on his YouTube channel. While consumer electronics has been his main focus for years, now Rusen is more interested in WordPress and software development. He had contributed different web application projects in his professional career. Rusen had graduated from Istanbul University, department of Computer Engineering. Rusen has a very high passion for learning and writing for every kind of technology. That's why he has been working as a tech editor for more than ten years on several different technology magazines and online news portals.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Learn how to install GE-Proton on Steam Play using the ProtonUp-Qt app

How to install GE-Proton on Steam Play using the ProtonUp-Qt app

Related News

What is a Daemon in Linux?

What is a Daemon in Linux?

March 24, 2023 6:30 pm
7 best practices and tools to use for Linux security

7 best practices and tools to use for Linux security

March 24, 2023 5:00 pm
What is Cloudflare Warp?

What is Cloudflare Warp?

March 23, 2023 8:15 pm
CISA aims to identify vulnerabilities that attract ransomware

CISA aims to identify vulnerabilities that attract ransomware

March 22, 2023 2:10 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • Podman Desktop – Containers & Kubernetes (Podcast #15 w/ Markus Eisele)
  • What is a Daemon in Linux?
  • 7 best practices and tools to use for Linux security
  • Photopea review: The best free Photoshop alternative for Linux
  • CloudFest 2023 is completed

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.