Gh0st RAT-based GodRAT attacks financial organizations
A newly identified Remote Access Trojan named GodRAT, based on the Gh0st RAT codebase, has been targeting financial firms since September 2024. The attackers distribute malicious .scr files via Skype, using steganography to embed shellcode in images. GodRAT supports plugins and is used alongside browser password stealers and AsyncRAT. The campaign, likely an evolution of the AwesomePuppet RAT connected to Winnti APT, remains active as of August 2025. Targets include organizations in Hong Kong, United Arab Emirates, Lebanon, Malaysia, and Jordan. The attackers employ various techniques to evade detection and maintain persistent access to compromised systems.
Pulse ID: 68a4a146413d549dcd9b3dac
Pulse Link: https://otx.alienvault.com/pulse/68a4a146413d549dcd9b3dac
Pulse Author: AlienVault
Created: 2025-08-19 16:07:34
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
