North Korean Trojan Activity
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
BANKSHOT consists of a number of proxy application tools intended to disguise command and control (C2) communications. Also included are two remote access trojan (RAT) tools designed to install the proxy applications.
HARDRAIN is two 32-bit Windows executables that function as proxy servers to mask the C2 communications of the third file, an Executable Linkable Format file designed as an Android-based RAT.
BADCALL appears similar to HARDRAIN except it uses an Android Package Kit file to store and execute the RAT.
At present, attack vectors for these threats are unknown. This article will be updated as and when information becomes available.
For further information:
Remediation advice
To prevent and detect a trojan infection, ensure that:Remediation steps
Last edited: 5 November 2020 2:34 pm