Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Australian Man Charged for Developing Imminent Monitor RAT

The Australian Federal Police announced over the weekend that a 24-year-old man has been charged for allegedly creating and selling a piece of spyware named Imminent Monitor (IM).

The Australian Federal Police announced over the weekend that a 24-year-old man has been charged for allegedly creating and selling a piece of spyware named Imminent Monitor (IM).

The suspect, who has not been named, is said to have created the remote access trojan (RAT) when he was 15 years old. He has been charged on six counts related to his alleged role in creating, selling and managing the malware between 2013 and 2019, when the IM RAT infrastructure was taken down as part of an international law enforcement operation.

The man, whose court hearing is scheduled for later this month, faces up to 20 years in prison. He was charged alongside a 42-year-old woman who lives at the same address as him — she faces one count of dealing with the proceeds of a crime.

Authorities identified the IM RAT developer, known online as “Shockwave”, in 2019, with the aid of cybersecurity company Palo Alto Networks. The firm’s researchers did not have much trouble uncovering the real identity and location of the IM RAT developer, who was linked to a company where his mother was listed as the registered agent.

IM RAT, offered for between $25 and $100 for a lifetime license, had been advertised as a legitimate tool designed for remote administration. Its advertised capabilities included remotely managing Windows servers, providing remote support, monitoring employees, and remote connections to home or office computers.

However, its functionality clearly showed that it was actually a piece of spyware. IM RAT could be used to remotely access a device’s webcam and microphone, log keystrokes, obtain passwords, disable security software, and copy files from the compromised system. The trojan also had the ability to hide its presence and some versions were even designed to run cryptocurrency miners on victims’ machines.

According to Australian police, the spyware was sold to more than 14,500 people across 128 countries, including individuals registered as sex offenders and ones involved in domestic violence cases. Authorities estimate there were tens of thousands of IM RAT victims around the world.

Palo Alto Networks reported in 2019 that it had observed more than 115,000 IM RAT attacks against its customers alone. The cybersecurity firm had collected more than 65,000 samples of the malware.

Advertisement. Scroll to continue reading.

When IM RAT infrastructure was shut down in 2019, police also arrested a dozen users of the malware. Its alleged developer was arrested the same year, but it appears charges were only brought against him now. The investigation conducted by Australian law enforcement is ongoing.

Australian police believe the 24-year-old made between $300,000 and $400,000 from selling the malware.

Related: Latvian Woman Charged in US With Role in Cybercrime Group

Related: Three Nigerian Users of Agent Tesla RAT Arrested

Related: Six Arrested for Roles in Clop Ransomware Operation

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.