<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><img src="https://info.threatstop.com/hubfs/Dark%20Track.png" alt="Dark Track" style="display: block; margin-left: auto; margin-right: auto;"></p> <p><strong>Darktrack</strong> received some <a href="http://virusguides.com/commercial-rats-face-serious-competition-freely-offered-darktrack/">publicity</a> in late 2016 for being a free Remote Access Trojan (<a href="https://dochub.threatstop.com/display/TS/R#R-_rat">RAT</a>) that was comparable to some of the top <a href="https://blog.threatstop.com/topic/rat">commercially available</a> RATs. <strong>Darktrack</strong> has the ability to access a victim's webcam, microphone, files, and passwords. It can also execute commands on infected machines, and make infected computers participate in <a href="https://dochub.threatstop.com/display/TS/D#D-_ddos" target="_blank">DDoS</a> attacks.</p> <div><!--more--> <div><span style="color: #545454; font-size: 12.1612px; background-color: transparent;">Researchers were surprised by the robust</span><span style="font-size: 12.1612px; background-color: transparent;">ness of the malware considering the price point. Unlike other free pieces of malware, </span><strong style="font-size: 12.1612px; background-color: transparent;">Darktrack</strong><span style="font-size: 12.1612px; background-color: transparent;"> seemed to be functional, stealth, and was not back-doored by the creator of the malware.</span></div> <p>Following this publicity, the creator of the malware shut down the website, <a href="http://news.softpedia.com/news/free-darktrack-rat-has-the-potential-of-being-the-best-rat-on-the-market-508179.shtml">citing concerns that the tool was being used as malware or for illegal activities.</a></p> <p>Fast-forward to May 2017, <strong>Darktrack</strong> version 5.0 was used in a <a href="https://nioguard.blogspot.ro/2017/05/targeted-attack-against-ukrainian.html?m=1">targeted spearphishing attack</a> on the Ukrainian military. Like many <a href="https://dochub.threatstop.com/display/TS/S#S-_spearphishing" target="_blank">spearphishing</a> attacks, the malware pretends to be a Microsoft Word document. However, once opened, it would inject the malware into the <em>svchost.exe</em> process on the victim's computer and display a decoy document to distract the user.</p> <p>Enabling the TSCritical targets to your user policy will add protection against Darktrack to your ThreatSTOP DNS and IP Firewall Services. If you do not have a ThreatSTOP account &nbsp;to try a demo.&nbsp;</p> <p>If you do have a ThreatSTOP account, instructions to add targets to <a href="http://dochub.threatstop.com/display/TS/ThreatSTOP+DNS+Firewall#ThreatSTOPDNSFirewall-DNSFWPolicy">DNS</a>&nbsp;or <a href="http://dochub.threatstop.com/display/TS/ThreatSTOP+IP+Firewall">IP</a> Firewall policies are available on the ThreatSTOP Documentation Hub, or contact our <span class="hs-cta-wrapper" id="hs-cta-wrapper-8093222e-eef6-41f3-bc5f-e4272bef25f2"><span class="hs-cta-node hs-cta-8093222e-eef6-41f3-bc5f-e4272bef25f2" id="hs-cta-8093222e-eef6-41f3-bc5f-e4272bef25f2"><a href="https://cta-redirect.hubspot.com/cta/redirect/2548414/8093222e-eef6-41f3-bc5f-e4272bef25f2"><img class="hs-cta-img" id="hs-cta-img-8093222e-eef6-41f3-bc5f-e4272bef25f2" src="https://no-cache.hubspot.com/cta/default/2548414/8093222e-eef6-41f3-bc5f-e4272bef25f2.png" alt="Support"></a></span></span>&nbsp;team.<span style="font-size: 12.1612px; background-color: transparent;">&nbsp;</span></p> </div></span>