Catalin Dragomir admits to hacking an Oregon government office and selling network access. Read more on the $250k fraud case and his 2026 sentencing.
Hackread – Cybersecurity News, Data Breaches, AI and More – Read More
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2026-02-24 13:06:522026-02-24 13:06:52Romanian Hacker Extradited to US Admits Hacking Oregon State Network
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2026-02-24 13:06:522026-02-24 13:06:52GitHub Issues Abused in Copilot Attack Leading to Repository Takeover
The North Korea-linked Lazarus Group (aka Diamond Sleet and Pompilus) has been observed using Medusa ransomware in an attack targeting an unnamed entity in the Middle East, according to a new report by the Symantec and Carbon Black Threat Hunter Team.
Broadcom’s threat intelligence division said it also identified the same threat actors mounting an unsuccessful attack against a healthcare
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2026-02-24 12:07:062026-02-24 12:07:06Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
Most identity programs still prioritize work the way they prioritize IT tickets: by volume, loudness, or “what failed a control check.” That approach breaks the moment your environment stops being mostly-human and mostly-onboarded.
In modern enterprises, identity risk is created by a compound of factors: control posture, hygiene, business context, and intent. Any one of these can perhaps be
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2026-02-24 12:07:062026-02-24 12:07:06Identity Prioritization isn’t a Backlog Problem – It’s a Risk Math Problem
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2026-02-24 12:07:062026-02-24 12:07:06Taiwan Security Firm Confirms Flaw Flagged by CISA Likely Exploited by Chinese APTs
The threat activity cluster known as UnsolicitedBooker has been observed targeting telecommunications companies in Kyrgyzstan and Tajikistan, marking a shift from prior attacks aimed at Saudi Arabian entities.
The attacks involve the deployment of two distinct backdoors codenamed LuciDoor and MarsSnake, according to a report published by Positive Technologies last week.
“The group used several
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2026-02-24 11:06:452026-02-24 11:06:45UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2026-02-24 11:06:452026-02-24 11:06:45Anonymous Fénix Members Arrested in Spain
Security professionals rely on early detection signals to prioritize and contain incidents. But what happens when a fully capable RAT generates none?
In a recent investigation, the ANY.RUN experts uncovered a new Go-based remote access trojan we named Moonrise. At the time of analysis, it wasn’t detected on VirusTotal and had no vendor signatures tied to it.
That’s the problem teams can’t ignore: credential theft, remote command execution, and persistence can be active while static checks stay silent. The result is slower triage, and more escalations.
Let’s break down Moonrise’s full attack chain and show how you can detect similar threats earlier, before they turn into longer investigations and real business impact.
Key Takeaways
Moonrise operated without early static detection, establishing active C2 communication before any vendor alerts were triggered.
The RAT supports credential theft, remote command execution, persistence, and user monitoring, enabling full remote control of an infected endpoint.
Silent C2 activity increases business exposure, extending dwell time and raising the risk of data loss, operational disruption, and financial impact.
Static reputation checks alone are not enough. Behavior-based analysis is critical to confirm real attacker activity quickly.
What Moonrise Means for Organizations
Moonrise isn’t just a remote access tool. Its command set shows how an attacker can move from access to impact.
Credential theft and clipboard monitoring can expose passwords, session tokens, and sensitive data copied between systems.
Remote command execution and process control let operators run scripts, interfere with defenses, and manipulate business applications.
File upload and execution creates a clean path to drop additional payloads, including stealers or ransomware.
Screen capture, webcam, and microphone access can reveal what’s happening inside finance workflows, admin panels, and internal communications.
Persistence and privilege-related functions increase dwell time and make removal harder.
One compromised endpoint can disrupt operations and lead to financial and reputational damage, especially when the malware stays below static detection thresholds long enough to expand access.
Reduce escalation and investigation costs Detect threats earlier with behavior-first clarity
Moonrise RAT detected inside ANY.RUN sandbox, revealing its full attack chain
Within minutes of execution, Moonrise established outbound communication and began responding to operator-driven commands. What looked harmless in static checks immediately revealed interactive control once behavior was observed.
1. Session Registration and Persistent Communication
The communication begins with:
client_hello
connected
ping/pong
These commands handle client identification and keep the WebSocket session alive. This confirms that the infected system is actively connected and ready to receive instructions.
At this stage, traditional static checks still show nothing suspicious. But behaviorally, the endpoint is already under remote control.
C2 communication overview of Moonrise RAT
2. Visibility Into the Host Environment
Once the session is established, the operator starts requesting information about the system.
Observed commands include:
process_list
file_list
webcam_list
monitors_list
screenshot
This allows the attacker to inspect running processes, review directory structures, identify connected displays, and check for available multimedia devices. Even when screen capture fails in a headless environment, the attempt itself signals active operator-driven interaction.
YARA rule match confirming screenshot functionality inside the Moonrise process
This stage provides the attacker with enough context to determine what data is accessible and which actions to take next.
3. Direct System Interaction and Control
Moonrise supports active command execution and process manipulation:
cmd
process_kill
file_upload
file_run
file_execute
file_delete
mkdir
explorer_restart
Through these commands, the operator can run system commands remotely, terminate selected processes, upload additional payloads, execute them, modify directories, and restart system components.
svchost.exe spawning cmd.exe to execute system commands inside the ANY.RUN sandbox
This shifts the attack from observation to full control. At this point, the endpoint is no longer just compromised. It can be used to deploy further tools or prepare deeper access.
4. Credential Access and Data Extraction
The sample includes commands associated with data theft and credential harvesting:
stealer
steam
file_download
keylogger_logs
clipboard_history
These functions enable collection of stored credentials, extracted files, logged keystrokes, and clipboard content. If sensitive data is copied between applications, such as passwords or financial details, it becomes accessible to the operator.
This is where technical compromise transitions into business exposure.
Reduce the risk of silent data exfiltration Turn weak signals into clear decisions fast
Moonrise includes extensive user interaction monitoring capabilities:
keylogger_start
keylogger_stop
keylogger_logs
input
clipboard_monitor_start
clipboard_monitor_stop
clipboard_history
clipper_get_addresses
clipper_set_address
screenshot
screen_stream_start
screen_stream_stop
webcam_capture
microphone_record
These commands allow the operator to monitor user input, track clipboard changes, capture screen content, and access audio or video devices.
The infected endpoint effectively becomes a live surveillance point.
Moonrise RAT actively checks for available and operational camera hardware before attempting capture
6. Privilege and System-Level Capabilities
Moonrise also contains commands related to privilege handling and system configuration:
uac_bypass
rootkit_enable
rootkit_disable
watchdog_status
protection_config
uxlocker_trigger
voltage_drop
These suggest support for privilege manipulation, system configuration changes, and persistence-related behavior. While not all commands may be triggered in every session, their presence indicatesextended control options.
7. Lifecycle Management and Disruption
Moonrise includes lifecycle management functions:
update
uninstall
These allow the operator to modify or remove the deployed version of the malware. This indicates support for maintaining or adjusting the infection over time.
The command set also contains user-facing system interaction functions:
fun
fun_message
fun_wallpaper
fun_openurl
fun_shake
fun_sound
fun_restart
fun_shutdown
fun_bsod
These commands suggest the ability to trigger visible system actions, including restarts or shutdown events, depending on operator intent.
Their presence reinforces that Moonrise provides broad remote interaction capabilities beyond silent monitoring.
Early Detection: 3-Step Loop That Works for Stealth RATs
Moonrise is a good example of an annoying reality: sometimes a RAT shows up with no clean static verdict, no reputation you can trust, and nothing obvious to latch onto. In those cases, early detection comes down to how quickly your team can move from unclear signals to evidence-based containment.
1. Monitoring: Catch the First Weak Signal Early
A lot of RAT incidents start with infrastructure: a fresh IP, a new domain, traffic that doesn’t match your baseline.
This is where ANY.RUN’s Threat Intelligence Feeds help. They continuously surface newly observed indicators and patterns based on telemetry and submissions from 15,000+ organizations and 600,000+ security professionals.
100% actionable IOCs delivered by TI Feeds to your existing stack
For SOC managers, that means fewer blind spots in day-to-day monitoring and earlier detection of suspicious infrastructure before it becomes a bigger incident.
99% unique threat data for your SOC Catch attacks early to protect your business
2. Triage: Enrich Fast, Then Confirm with Behavior
When static checks don’t help, teams often lose time debating severity. That’s where MTTR grows and escalation pressure builds.
A cleaner path is enrich → execute → decide. Use Threat Intelligence Lookup to pull immediate context around a hash, URL, domain, or IP (relationships, related samples, historical sightings). Then run the artifact in the ANY.RUN Sandbox to confirm what it actually does in a safe environment.
ANY.RUN’s sandbox detected full attack chain of Moonrise, including the implemented TTPs in a few minutes, instead of hours
This is how teams replace uncertainty with evidence, reduce unnecessary Tier-1 escalations, and contain earlier, before a RAT turns into credential loss or broader access.
74% of Fortune 100 companies rely on ANY.RUN for earlier detection and faster SOC response
3. Threat Hunting: Turn One Confirmed Case into Wider Coverage
Once you confirm a RAT-like incident, the next step is making sure it doesn’t repeat under a slightly different wrapper. Threat Intelligence Lookup helps you pivot from confirmed indicators to related infrastructure and nearby samples, so hunting stays tied to what’s active now.
From there, you can pivot into related IPs/domains, cluster similar samples, and validate behavior in the sandbox to decide whether it’s the same activity or a lookalike.
Below is an example of a TI Lookup query for the Moonrise C2 IP observed in the attack:
TI Lookup displays sandbox analyses related to the IP address used in the Moonrise attack
When these three motions run as a loop, monitoring, fast triage, and targeted hunting, stealth RATs stop being “late discoveries” and become manageable security events with lower response cost and less business exposure.
Conclusion: Reducing Exposure Starts with Faster Clarity
Moonrise is a reminder that the biggest risk isn’t the RAT itself but the time lost before it’s clearly identified. When static checks stay silent, attackers can steal credentials, stage more payloads, and lock in persistence while teams are still debating severity.
Reducing exposure comes down to one thing: faster clarity. Feed fresh infrastructure signals into monitoring, enrich quickly with TI Lookup, and confirm behavior in the sandbox before the case grows into a costly incident.
ANY.RUN, a leading provider of interactive malware analysis and threat intelligence solutions, fits naturally into modern SOC workflows and supports investigations from initial alert to final containment.
It allows teams to safely execute suspicious files and URLs to observe real behavior, enrich indicators with immediate context through TI Lookup, and continuously monitor emerging infrastructure using Threat Intelligence Feeds. Together, these capabilities help reduce uncertainty, accelerate triage, and limit unnecessary escalations.
Today, more than 600,000 security professionals across 15,000+ organizations rely on ANY.RUN to make faster decisions, strengthen detection coverage, and stay ahead of evolving phishing and malware campaigns.
To stay informed about newly discovered threats and real-world attack analysis, follow ANY.RUN’s team on LinkedIn and X, where weekly updates highlight the latest research, detections, and investigation insights.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2026-02-24 11:06:372026-02-24 11:06:37Moonrise RAT: A New Low-Detection Threat with High-Cost Consequences
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2026-02-24 08:30:142026-02-24 08:30:14How to take full-page screenshots in Chrome on any device – it’s easy and free