You can see above that FіnFіѕhеr seem to provide payloads through different devices, even through websites, and USB devices. This is how FіnFіѕhеr is being distributed mostly in the darknet:Īnd it comes with a good number of documents and trainings which will tell you how to install and run it, and how to deliver the payload to the victim’s computer: The hacker now can activate the smartphone’s cameras, access files, listen to everything being spoken through microphone access, send SMS and read existing ones, see contacts and phone logs, and many more. Make changes on the registry, services, make uploads, and run scripts.Start, close and make use of existing software and processes.Access to the computer’s network such as printers, and other locally or externally connected networks.Disable and activate any kind of settings including security settings and firewalls. Explore and download files on the victim’s computer covertly without the victim noticing.Keylog everything that is being typed into the keyboard.Monitor every movement on the screen of the victim including mouse movements in real-time and the ability to capture screen as images or videos.Tab into the microphone and speaker to eavesdrop any conversation.Manipulating the web cam drivers that will allow him to turn on the web cam covertly.The RAT Agent allows following options to the hacker among others: This is the dashboard the hacker has installed on his own Windows PC from where he has full control of the infested computer. Often the tool will compromise core system files of Windows, so it acts like a normal Windows service where it then becomes extremely difficult to be identified as a trojan horse. Once that file is started on a Windows PC for example, it immediately puts itself into the white list of any installed antivirus and firewall tools, and hides itself from being detected through common tools such as Windows Services and similar. The RAT payload is the trojan horse file the victim has to run by being misled. This is the software piece the hacker installs on a server somewhere, usually on a Linux based server, either a dedicated or cloud based server anywhere.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |