Orcus Remote Access Trojan
First observed in 2016, Orcus is a .NET-based remote administration tool whose author has indicated that it was created for illegitimate purposes.
Summary
First observed in 2016, Orcus is a .NET-based remote administration tool whose author has indicated that it was created for illegitimate purposes.
Affected platforms
The following platforms are known to be affected:
Threat details
In 2019, the group who managed the tool announced they were no longer developing it and released the latest build version on several dark net forums.
At the time of publication, Orcus has been distributed through spam or phishing campaigns, watering hole attacks, drive-by downloads or embedded within web content. Once on a device, it will use a User Access Control bypass to identify and hijack the highest privileged process currently active in the affected device before connecting to a command and control server.
Despite being offered as a 'legitimate' tool and having the expected functionality for a administration tool, Orcus has the following malicious capabilities:
- Perform distributed denial-of-service attacks.
- Extract browser credentials and cookies.
- Spoof file extensions.
- Log keystrokes.
- Record camera and microphone input.
- Disable camera activity indicators.
Remediation steps
| Type | Step |
|---|---|
|
To prevent and detect a trojan infection, ensure that:
|
Last edited: 14 February 2020 2:51 pm