FlawedAmmyy RAT has been rated as one of the most remote access trojans in 2018. The malware, that is active since the beginning of 2016, has been observed to be used in highly targeted email attacks as well as massive cyberespionage campaigns.
According to Proofpoint, a majority of these campaigns affected the automotive industry, with many of them associated with TA505 threat actor group.
Creation of the RAT - FlawedAmmyy derives its source code from version 3 of the Ammyy Admin remote desktop software. Ammyy Admin is a popular remote access tool used by businesses and consumers to remote control and diagnostics on Microsoft Windows machines.
Although FlawedAmmyy was publicly available since 2016, the RAT came to the light in 2018. It includes several functionalities of the leaked version such as:
Capabilities - Upon infection, the RAT can enable potential attackers to perform a variety of malicious activities such as:
The FlawedAmmyy C2 protocol occurs over port 443 with HTTP.
Major instances - The notorious FlawedAmmyy RAT is delivered to the target via phishing emails. Some of the known attack campaigns where the RAT was distributed via phishing emails include:
Experts believe that attackers will continue to use FlawedAmmyy’s activeness to target more and more enterprises in the future.
Publisher