![]() The keylogging feature allows the attackers to record keyboard input (all data typed with a keyboard). Also, ArrowRAT can recover passwords from browsers such as 360, Amigo, Chromium, Comodo and Comodo Dragon, Epic Privacy Browser, Kometa, Opera, Orbitum, Torch, Vivaldi, and a couple of other browsers.Īdditionally, ArrowRAT can obtain system information, log keystrokes, hide files and folders, manage files and startup items, enable webcam and microphone, run CMD commands, edit Registry, exploit UAC, and kill processes running in the Task Manager. Threat actors can use ArrowRAT to access multiple browsers (Chrome, Firefox, Brave, and Edge) and email clients (Outlook, Thunderbird, and Foxmail).Ĭybercriminals can obtain saved passwords, browsing history, and cookies from web browsers and clone profiles. Its creators offer three subscription plans: monthly ($100), three months ($300), and lifetime ($400).ĪrrowRAT includes a Hidden Virtual Network Computing (HVNC) module, which enables attackers to launch a hidden virtual desktop on infected computers with minimal computing skills. ArrowRAT is offered as Malware-as-a-Service (MaaS). ArrowRAT is the name of a Remote Access Trojan (RAT) that allows threat actors to perform various malicious activities on infected/accessed computers. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |