Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content.
You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Managing your cookies

Our website uses cookies. You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button.

Necessary cookies

These are essential for the user navigation and allow to give access to certain functionalities such as secured zones accesses. Without these cookies, it won’t be possible to provide the service.
Matomo on premise

Marketing cookies

These cookies are used to deliver advertisements more relevant for you, limit the number of times you see an advertisement; help measure the effectiveness of the advertising campaign; and understand people’s behavior after they view an advertisement.
Adobe Privacy policy | Marketo Privacy Policy | MRP Privacy Policy | AccountInsight Privacy Policy | Triblio Privacy Policy

Social media cookies

These cookies are used to measure the effectiveness of social media campaigns.
LinkedIn Policy

Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Skip to main content

PlugX & QuasarRat still in the game

Atos Threat Intelligence team

PlugX & QuasarRat still in the game

 

Investigation started with discovery of new iteration of PlugX implant, which was created around November 2018 and uploaded to file scanning services, together with similar malware, in the early January 2019.

Pivoting by the IP address of suspected C2 server enabled discovery of additional malware samples: QuasarRat, and one family that has not yet been identified at the time. Analysis of those files revealed that implants were designed as information gathering tools, and included functionality that enabled the capturing of credentials for network-based logons.

Download the whitepaper to learn about the recommendations from the Atos Threat Intelligence team.

Download Whitepaper

Thank you for your interest. You can download the report here.
A member of our team will be in touch with you shortly

Share This:FacebookTwitterLinkedIn