Cybercriminals use fake Pokémon NFT game to install remote access tool – Neowin

npressfetimg-437.png

If you just encountered a new Pokémon card game online that promises to give you non-fungible tokens (NFTs), think twice before clicking it, as it could contain malicious software.

Threat actors are currently using a legitimate-looking Pokémon game to distribute the NetSupport remote access tool (RAT) and gain control of their systems. Initially uncovered by analysts at ASEC, the fake game markets itself as a new NFT card game where users can play with Pokémon cards and earn profits with their NFT investments.

When users click on the “Play on PC” button on the fraudulent game’s website, an executable file will be downloaded to their device. While the file looks like a game installer, it actually contains the NetSupport RAT.

Once the file is executed, it creates a folder in the %APPDATA% path and creates hidden NetSupport RAT-related files, making it difficult for users to remove the malware. The file also creates an entry in the Startup folder so the malware can run even after every boot.

While the NetSupport RAT is a legitimate program used to give system administrators remote access to users’ computers, the configuration file in this situation contains the threat actor’s command-and-control server address. This means that when NetSupport is executed, it will establish a connection to the threat actor’s NetSupport server, enabling the fraudsters to steal data and install even more malware.

Given how many legitimate NFT trading card games there are online (and the popularity of Pokémon itself), it’s highly plausible for people to fall victim to such an online threat. To protect yourself from such scams, never download or install software from websites you don’t completely trust. Refrain from opening an email attachment or link you received from someone you don’t know and always make sure that your devices and anti-malware software are updated.

Source: ASEC

Source: https://news.google.com/__i/rss/rd/articles/CBMiYmh0dHBzOi8vd3d3Lm5lb3dpbi5uZXQvbmV3cy9jeWJlcmNyaW1pbmFscy11c2UtZmFrZS1wb2ttb24tbmZ0LWdhbWUtdG8taW5zdGFsbC1yZW1vdGUtYWNjZXNzLXRvb2wv0gFhaHR0cHM6Ly93d3cubmVvd2luLm5ldC9hbXAvY3liZXJjcmltaW5hbHMtdXNlLWZha2UtcG9rbW9uLW5mdC1nYW1lLXRvLWluc3RhbGwtcmVtb3RlLWFjY2Vzcy10b29sLw?oc=5

npressfetimg-1249.png
Remote access

Remote Access to Government and Courts is Needlessly Eroding – GlobeNewswire

TORRANCE, Calif., Jan. 31, 2023 (GLOBE NEWSWIRE) — Tragically, it is now almost a daily occurrence for courts and government bodies of all sizes across the nation to eliminate or restrict remote public access and partic…….

Read More
npressfetimg-1176.png
Remote access

New Python malware backdoors VMware ESXi servers for remote access – BleepingComputer

A previously undocumented Python backdoor targeting VMware ESXi servers has been spotted, enabling hackers to execute commands remotely on a compromised system.

VMware ESXi is a virtualization platform commonly used in the enterprise to host numerous servers on one device while using CPU and memory resources more effectively.

The new backdoor was discovered by Juniper Ne…….

Read More
npressfetimg-1103.png
Remote access

Industrial Remote Access Market Size 2023 Global Development … – Digital Journal

PRESS RELEASE

Published January 24, 2023

[Newest Report with 102 Pages] : Industrial Remote Access Market Outlook report covers segment by Applications (Machine Manufacturer, Line Manufacturer, System Integrator), By Types (Industrial VPN Router, Software System) and offers extensive forecasts from 2023-2029.

[No. of Pages 102] | Pre and Post Covid is Covered and Report is Av…….

Read More