ESET Reveals AsyncRAT Is Becoming a Cybercriminal Favorite

ESET Reveals AsyncRAT Is Becoming a Cybercriminal Favorite

ESET Research is releasing its analysis of AsyncRAT — a remote access tool (RAT) designed to remotely monitor and control other devices. Over the years, AsyncRAT has cemented its place as a cornerstone of modern malware and as a pervasive threat that has evolved into a sprawling network of its variants and forks (customized and improved versions of the original tool). The published analysis provides an overview of the most relevant forks of AsyncRAT, drawing connections between them and showing how they have evolved.

AsyncRAT, an open-source RAT, was released on GitHub in 2019 by a user going by the name of NYAN CAT. It offers a wide range of typical RAT functionalities, including keylogging, screen capturing, credential theft, and more. Its simplicity and open-source nature have made it a popular choice among cybercriminals, leading to its widespread use in various cyberattacks.

“AsyncRAT introduced significant improvements, particularly in its modular architecture and enhanced stealth features, making it more adaptable and harder to detect in modern threat environments. Its plug-in-based architecture and ease of modification have sparked the proliferation of many forks, pushing the boundaries even further,” says ESET researcher Nikola Knežević, author of the study.

Ever since it was released to the public, AsyncRAT has spawned a multitude of new forks that have built upon its foundation. Some of these new versions have expanded on the original framework, incorporating additional features and enhancements, while others are essentially the same version in different clothes. The most popular variants for the attackers, according to ESET telemetry, are DcRat, VenomRAT, and SilverRAT.

DcRat offers a notable improvement over AsyncRAT in terms of features and capabilities, while VenomRAT is packed with further additional features. However, not all RATs are serious in nature,  and this applies equally to AsyncRAT forks. Clones like SantaRAT or BoratRAT are meant to be jokes. Despite this, ESET has found instances of real-world malicious usage of these in the wild.

In its analysis, ESET Research has cherry-picked some lesser-known forks, too, as they enhance AsyncRAT’s functionality beyond the features included in the default versions. These exotic forks are often the work of one person or group, and they make up less than 1% of the volume of AsyncRAT samples.

“The widespread availability of frameworks such as AsyncRAT significantly lowers the barrier to entry for aspiring cybercriminals, enabling even novices to deploy sophisticated malware with minimal effort. This development further accelerates the creation and customization of malicious tools. This evolution underscores the importance of proactive detection strategies and deeper behavioral analyses to effectively address emerging threats,” concludes Knežević.

 

Pillars of modern digital transformation

Pillars of modern digital transformation

Prithika Sharone Rosaline, Enterprise Analyst at ManageEngine, explains that…
Dormant accounts can be a big risk

Dormant accounts can be a big risk

Phil Muncaster, guest writer for ESET, cautions that long-forgotten online accounts could pose…
Deepfakes threating corporates now

Deepfakes threating corporates now

Jim Richberg, Head of Cyber Policy and Global Field CISO at Fortinet,…
Push Security secures $30 million Series B funding

Push Security secures $30 million Series B funding

Push Security, a pioneer in detecting and responding to modern identity attacks…
Pemo enters Saudi Arabia in partnership with neoleap

Pemo enters Saudi Arabia in partnership with neoleap

Pemo, the all-in-one spend management platform, has officially launched…
TruBuild raises $1 million to enhance its AI platform

TruBuild raises $1 million to enhance its AI platform

TruBuild, the AI-powered construction technology startup focused on preventing delays and unexpected…