Parasite HTTP Remote Access Trojan
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
At the time of publication, Parasite HTTP has been distributed via spam email campaigns targeted towards certain industries including healthcare. The emails include Word document attachments such as fake CVs that contain malicious macros. When the macros are enabled, the RAT is downloaded and executed.
Parasite HTTP employs a wide range of techniques to avoid analysis including sandbox detection, anti-debugging and anti-emulation methods. It includes modules that can control the user's desktop, alter user accounts and steal information including passwords. Infected devices can be instructed to download additional modules, so the capabilities of the RAT can be extended in future.
Remediation advice
To prevent and detect a trojan infection, ensure that:Remediation steps
| Type | Step |
|---|---|
|
Last edited: 17 February 2020 12:52 pm