CYBER MONGOL
  • ASATA
  • Our Journey
  • Intelligence Engine
  • Human-Machine Teaming
  • Operator Research
  • Achievements and Media
  • Counter Intelligence
  • ASATA
  • Our Journey
  • Intelligence Engine
  • Human-Machine Teaming
  • Operator Research
  • Achievements and Media
  • Counter Intelligence
Search by typing & pressing enter

YOUR CART

1/16/2021 0 Comments

Heavy Sensor Activity: NEW Arbitrium-RAT–Claimed FUD

Picture
*Heavy Sensor Activity: NEW Arbitrium-RAT – Claimed to be FUD* Sensors are seeing heavy human momentum within the cyber security ecosystem, focused on a new RAT claimed to be fully undetectable. As usual, we are making a link available to the tool, but we are also going to provide a link to a JSON set containing the last 10 hours of our sensor activity (since 12:01am), so context can be gleaned. Note, this dataset is pre-engine processing (raw ingestion) so there will not be any of the more advanced tags applied to the set such as behaviors, API calls, libraries, processes, social reach, etc… Additionally, we have been asked to mirror our threat intel on our website, so it is more easily sharable for people not on LinkedIn. This has also been done.
 
RAT: https://github.com/BenChaliah/Arbitrium-RAT
 
JSON (Live Signals last 10 hours (pre-processing)): File Below
10hour_sensor_hit_distribution_cybermongol.json
File Size: 32 kb
File Type: json
Download File

Video Demo:
0 Comments



Leave a Reply.

    Archives

    July 2021
    June 2021
    May 2021
    March 2021
    February 2021
    January 2021

    RSS Feed

contact us:
© COPYRIGHT 2015. ALL RIGHTS RESERVED.