Security Experts:

Connect with us

Hi, what are you looking for?


Malware & Threats

njRAT Infections on the Rise: Security Firms

The notorious remote access Trojan (RAT) known as njRAT is making a comeback, according to security firms Zscaler and PhishMe.

The notorious remote access Trojan (RAT) known as njRAT is making a comeback, according to security firms Zscaler and PhishMe.

In June 2014, Microsoft attempted to disrupt the njRAT (Bladabindi) and NJw0rm (Jenxcus) malware families. Now, after several months in which there haven’t been any major developments, researchers say they have noticed an increase in njRAT infections.

The RAT, developed in .NET, allows attackers to take complete control of an infected device. The malware is capable of logging keystrokes, downloading and executing files, providing remote desktop access, stealing application credentials, and accessing the infected computer’s webcam and microphone.

PhishMe reports that njRAT has been distributed over the past period with the aid of spam emails advertising a car changer hack for the “Need for Speed: World” video game. Zscaler also noted that video game cracks and application key generators are often used as lure.

When Microsoft targeted njRAT in 2014, the company seized nearly two dozen domains belonging to dynamic DNS provider No-IP. Microsoft argued at the time that No-IP domains had been used 93 percent of the time for njRAT and NJw0rm infections. However, the DNS company lashed out at Microsoft for the way it handled the operation because the decision to seize the domains without any warning affected numerous legitimate customers.

Now, Zscaler and PhishMe report that No-IP services are still being abused by njRAT operators. Zscaler has identified more than 20 dynamic DNS services abused by malware authors for command and control (C&C) communications.

Zscaler has also noticed an increase in H-Worm infections. H-Worm, a VBScript-based RAT that shares code with njRAT, was analyzed by FireEye in September 2013 when it had been used in targeted attacks aimed at the international energy industry.

According to researchers, new H-Worm variants continue to emerge. Zscaler has tracked a total of 16 active variants in 2015.

“Despite Microsoft’s attempts to disrupt the C&C channel for this notorious RAT back in June 2014, we continue to see the usage of various dynamic DNS services by the malware authors for it’s C&C server communication. It remains one of the most popular and prevalent RATs in the wild today,” researchers wrote in a blog post.

In January, Trend Micro reported that the source code of NJw0rm, published on hacker forums in May 2013, had been used by malware developers to create new RATs. One of these new threats, dubbed “Sir DoOom,” emerged in December 2014. The malware can be used to carry out a wide range of tasks, including mine Bitcoin, launch DDoS attacks, take control of computers, and terminate antivirus processes.

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Malware & Threats

Threat actors are increasingly abusing Microsoft OneNote documents to deliver malware in both targeted and spray-and-pray campaigns.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Malware & Threats

A vulnerability affecting IBM’s Aspera Faspex file transfer solution, tracked as CVE-2022-47986, has been exploited in attacks.


More than 3,800 servers around the world have been compromised in recent ESXiArgs ransomware attacks, which also include an improved process.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.