Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Python-based PyRAT with Cross-Platform Capabilities and Extensive Remote Access Features

Posted on January 29, 2026January 29, 2026 By CWS

A brand new Python-based distant entry trojan has emerged, focusing on each Home windows and Linux programs with subtle surveillance and knowledge theft capabilities.

The malware operates by establishing command-and-control communication by means of unencrypted HTTP channels, permitting attackers to execute instructions, steal information, and seize screenshots remotely.

When executed, it instantly begins fingerprinting the sufferer’s system by gathering particulars equivalent to working system kind, hostname, and present username.

This info is then transmitted to the attacker’s server, enabling them to trace particular person victims throughout periods.

K7 Safety Labs researchers recognized the malware throughout routine investigations on VirusTotal, the place they found an ELF binary written fully in Python.

The trojan was packaged utilizing PyInstaller model 2.1 with Python 2.7, concealing its malicious code inside what gave the impression to be a reputable executable.

Imported modules (Supply – K7 Safety Labs)

Upon extraction utilizing specialised instruments, analysts uncovered the principle entry level in a file named agent-svc.pyc, which contained the entire distant entry performance organized beneath a single class known as “Agent.”

The malware achieves persistence in a different way relying on the working system. On Linux programs, it creates a misleading autostart entry at ~/.config/autostart/dpkgn.desktop, utilizing a reputation that mimics reputable Debian bundle instruments to keep away from detection.

This file executes mechanically when customers log in, sustaining the malware’s presence with out requiring administrator privileges.

Communication with C2 (Supply – K7 Safety Labs)

On Home windows programs, it provides a registry entry within the present consumer’s Run key beneath the identify “lee,” guaranteeing computerized execution at startup whereas staying inside user-level permissions.

Command-and-Management Infrastructure

The trojan communicates with its command server by means of fundamental HTTP POST requests directed at particular endpoints, transmitting system knowledge in plain JSON format with out encryption.

This design makes the site visitors extremely susceptible to community monitoring and detection.

The malware makes use of a semi-persistent identifier created by combining the sufferer’s username with their MAC handle, permitting attackers to trace particular person infections even when some system particulars change.

Communication frequency adapts based mostly on exercise state, with idle durations that includes longer intervals to scale back community visibility, whereas lively periods ballot quickly each half second to take care of responsiveness to incoming instructions.

Home windows Persistence (Supply – K7 Safety Labs)

The malware helps intensive file operations together with unrestricted uploads and downloads by means of multipart form-data encoding.

It may possibly enumerate total listing constructions, change working directories, and create ZIP archives for bulk knowledge exfiltration utilizing the DEFLATE compression algorithm.

Screenshot seize performance information your complete display screen by means of PIL’s ImageGrab module, saving photographs as non permanent JPEG information which might be mechanically uploaded to the attacker’s server.

All operations run in separate threads to stop blocking the principle communication loop, guaranteeing steady availability for receiving new instructions whereas executing present duties.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Access, Capabilities, CrossPlatform, Extensive, Features, PyRAT, PythonBased, Remote

Post navigation

Previous Post: Matanbuchus Malware Downloader Evading AV Detections by Changing Components
Next Post: Beware of Weaponized VS Code Extension Named ClawdBot Agent that Deploys ScreenConnect RAT

Related Posts

Hackers Exploiting GeoServer RCE Vulnerability to Deploy CoinMiner Cyber Security News
Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters Cyber Security News
New KimJongRAT Stealer Using Weaponized LNK File to Deploy Powershell Based Dropper Cyber Security News
New GlassWorm Using Invisible Code Hits Attacking VS Code Extensions on OpenVSX Marketplace Cyber Security News
Jetflicks Illegal Paid Streaming Service Operators Jailed for 7 Years Cyber Security News
China-linked APT24 Hackers New BadAudio Compromised Legitimate Public Websites to Attack Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Exposed Open Directory Leaks BYOB Framework Across Windows, Linux, and macOS
  • Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries
  • Threat Actors Leverage Google Search Ads for ‘Mac Cleaner’ to Direct Users to Malicious Websites
  • Beware of Weaponized VS Code Extension Named ClawdBot Agent that Deploys ScreenConnect RAT
  • Python-based PyRAT with Cross-Platform Capabilities and Extensive Remote Access Features

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Exposed Open Directory Leaks BYOB Framework Across Windows, Linux, and macOS
  • Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries
  • Threat Actors Leverage Google Search Ads for ‘Mac Cleaner’ to Direct Users to Malicious Websites
  • Beware of Weaponized VS Code Extension Named ClawdBot Agent that Deploys ScreenConnect RAT
  • Python-based PyRAT with Cross-Platform Capabilities and Extensive Remote Access Features

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark