Statements (39)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Remote Access Trojan
|
gptkbp:category |
Trojan
Cybercrime tool Spyware |
gptkbp:controls |
Command and Control server
|
gptkbp:detects |
Antivirus software
|
gptkbp:developedBy |
gptkb:Breaking_Security
|
gptkbp:distributedBy |
Exploit kits
Malicious attachments Phishing emails |
gptkbp:features |
Audio recording
Bypass User Account Control File management Keylogger Password stealing Persistence mechanisms Process management Remote shell Screen capture Webcam access |
gptkbp:firstAppearance |
2016
|
https://www.w3.org/2000/01/rdf-schema#label |
Remcos RAT
|
gptkbp:legalStatus |
Illegal if used for unauthorized access
|
gptkbp:malicious |
Yes
|
gptkbp:notable_campaign |
COVID-19 themed phishing
Financial sector attacks Targeted attacks on government organizations |
gptkbp:platform |
gptkb:Windows
|
gptkbp:priceRange |
Varies
|
gptkbp:sells |
Commercial software
|
gptkbp:type |
malware
|
gptkbp:usedFor |
Surveillance
Data exfiltration Credential theft Keylogging Remote control of infected computers |
gptkbp:website |
https://breakingsecurity.net/remcos/
|
gptkbp:bfsParent |
gptkb:TA-90
|
gptkbp:bfsLayer |
5
|