article thumbnail

Orcus RAT Author Charged in Malware Scheme

Krebs on Security

The accused, 36-year-old John “Armada” Revesz , has maintained that Orcus is a legitimate “ R emote A dministration T ool” aimed at helping system administrators remotely manage their computers, and that he’s not responsible for how licensed customers use his product. An advertisement for Orcus RAT.

Malware 204
article thumbnail

iOS Lockdown Mode effective against NSO zero-click exploit

Malwarebytes

image courtesy of Citizen Lab This is a huge deal since it shows how useful Lockdown Mode can be, even against exploits developed by one of the world’s most notorious commercial spyware producers. System administrators can install and remove configuration profiles on that device.

Spyware 87
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Canadian Police Raid ‘Orcus RAT’ Author

Krebs on Security

As first detailed by KrebsOnSecurity in July 2016 , Orcus is the brainchild of John “Armada” Rezvesz , a Toronto resident who until recently maintained and sold the RAT under the company name Orcus Technologies. In an “official press release” posted to pastebin.com on Mar. In an “official press release” posted to pastebin.com on Mar.

article thumbnail

Malware Evolves to Present New Threats to Developers

Security Boulevard

Trojans/Spyware. RaaS offers one example of threat actors successfully adopting technology to spread malicious code, but the shift to cloud services introduced other dangers. This technique lets attackers deliver malicious code to thousands of systems through a vector that security measures routinely ignore?—?a Ransomware.

Malware 96
article thumbnail

Advanced threat predictions for 2023

SecureList

Looking back at past leaks of private companies providing such services, such as in the case of Hacking Team, we learned that many states all over the world were buying these capabilities, whether to complement their in-house technologies or as a stand-alone solution they couldn’t develop. The next WannaCry.

Firmware 111