Recently, the CISA, along with the U.S. Department of Defense’s Cyber National Mission Force (CNMF), has warned regarding the new SlothfulMedis Rat that is used by sophisticated cyber attackers. Both the parties have published a malware analysis report that gives all the technical details of a new dropper traced as SlothfulMedia.
CISA and CNMF are classifying this MAR to facilitate the network defense and diminished the exposure to the ill-disposed activity. The MAR covers all the suggested answer actions and advised mitigation methods.
The analysis report results from analytic works that have been performed between the Cybersecurity and Infrastructure Security Agency (CISA) and the Cyber National Mission Force (CNMF).
In this malware variant, there are a total of two files that have been executed in operation. The first one is a remote access tool (RAT) named ‘mediaplayer.exe,’ and the other file has a casual five-character name, and it removes the dropper once the RAT has a resolution.
“Analysis has determined the RAT has the ability to terminate processes, run arbitrary commands, take screenshots, modify the registry, and modify files on victim machines. It appears to communicate with its C2 controller via Hypertext Transfer Protocol (HTTP) over Transmission Control Protocol (TCP).” researchers said.
However, this persistence is being accomplished by producing a service named “Task Frame,” which secures the RAT is stored after a reboot.
The users or administrators should flag activity linked with the malware and report all the activity to the CISA or the FBI Cyber Watch (CyWatch), and then give the activities the highest priority for improved moderation.
According to the CISA report, there are some easy recommendations that every user and administrator should follow appropriately to strengthen the security posture of their organization’s systems. Moreover, CISA also asserted that further configuration alterations should be checked by system owners and administrators to avoid unwanted attacks.
Here are the recommendations provided by the security experts at CISA:-
The security experts have suggested that every user should perform all these recommendations, as these recommendations will help them bypass all possible threats and attacks.
Apart from this, CISA has affirmed that they would collect all the further information regarding this malware and notify publicly.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.
Also Read: Microsoft Suspended 18 Azure Active Directory Apps That Operated by the Chinese APT Hackers
Kali Linux users worldwide are facing an imminent disruption as the security-focused distribution has announced…
In a significant shift observed during the first quarter of 2025, cybersecurity experts have documented…
The cybersecurity landscape is witnessing a significant shift as threat actors increasingly leverage Ransomware as…
Senior members of the World Uyghur Congress (WUC) living in exile became targets of a…
A new Ransomware-as-a-Service (RaaS) group called RansomHub emerged in the cybercriminal ecosystem, specializing in targeting…
SAP released an emergency out-of-band patch addressing CVE-2025-31324, a critical zero-day vulnerability in SAP NetWeaver…