Security researchers from Zscaler have found a new remote access Trojan (RAT) for sale on the Dark Web that includes multiple functions and is able to spread via removable USB drives.
Dubbed Saefko, the backdoor remains in the background and executes every time a user logs in. The malware was designed to fetch Chrome browsing history for specific types of activities, send data to the command and control (C&C) server, and execute commands received from the C&C.
The RAT’s browsing history harvesting targets activities involving credit cards, business, social media, gaming, cryptocurrency, shopping, and the like. Upon receiving commands from the C&C, it can take screenshots, log keystrokes, record videos, and perform other actions as well, including downloading and executing additional payloads.
Upon infection, the malware copies itself to two AppData directories, then also creates a startup key to ensure it is executed at each login (the key is different for accounts with administrative privileges), Zscaler reveals.
The malware then checks whether the system has an active Internet connection and attempts to identify whether the system has any vital information.
The threat searches the collected browsing history and counts entries found in several categories, such as credit card possibility, gaming activity value, crypto-currency value, Instagram activity, Facebook activity, YouTube activity, Google+ activity, Gmail activity, shopping activity, and business value.
The RAT can collect additional user application data, including IRC information (channel name, nickname, password, communication port, server name and uptime), system uptime, machine architecture, number of crypto/business/payment/etc. sites visited, country code, IP address, and geographic location of the machine, and captures screenshots.
All of the collected data is then sent to the C&C server, after which the RAT waits an OK response. When it arrives, the malware begins a ‘StartServices’ function that has four different infection modules, namely HTTPClinet, IRCHelper, KEYLogger, and StartLocalServices (for USB spreading).
The RAT can send a request for a task, which it receives in the form of a URL to download a new payload from, can use the SetWindowsHookEx API for capturing keystrokes, and can connect to an IRC server to receive commands (to download files, execute commands, open URLs, send system information, capture screenshots, get system location, or uninstall).
The threat can also spread via removable USB drives, by copying itself to them and creating lnk files for every file and directory on the drives, but pointing to a file that executes the malware, which allows it to further infect systems.
The security researchers also discovered on a forum an ad for a cracked Saefko RAT tool, which apparently is “a multi-protocol, multi-operating system remote administration tool that can be used to launch the malware on Windows and Android devices.”
Related: New “LookBack” Malware Used in Attacks Against U.S. Utilities Sector
Related: New Attack Delivers FlawedAmmyy RAT Directly in Memory

More from Ionut Arghire
- KeePass Update Patches Vulnerability Exposing Master Password
- Google Workspace Gets Passkey Authentication
- Cybersecurity Startup Elba Raises €2.5 Million for Employee-Focused Product
- Apple Unveils Upcoming Privacy and Security Features
- Dozens of Malicious Extensions Found in Chrome Web Store
- Microsoft Makes SMB Signing Default Requirement in Windows 11 to Boost Security
- Zyxel Urges Customers to Patch Firewalls Against Exploited Vulnerabilities
- Gigabyte Rolls Out BIOS Updates to Remove Backdoor From Motherboards
Latest News
- KeePass Update Patches Vulnerability Exposing Master Password
- AntChain, Intel Create New Privacy-Preserving Computing Platform for AI Training
- Keep Aware Raises $2.4M to Eliminate Browser Blind Spots
- Google Workspace Gets Passkey Authentication
- Cybersecurity Startup Elba Raises €2.5 Million for Employee-Focused Product
- Zoom Expands Privacy Options for European Customers
- Several Major Organizations Confirm Being Impacted by MOVEit Attack
- Apple Unveils Upcoming Privacy and Security Features
