
SpankRAT Exploits Windows Explorer Processes for Stealth and Delayed Detection
A newly identified two-component Remote Access Trojan (RAT) toolkit built in Rust, dubbed SpankRAT, is being used by threat actors to abuse legitimate Windows processes, bypass reputation-based security controls, and maintain persistent access to compromised environments while largely evading detection on VirusTotal. Researchers at ANY.RUN has identified and analyzed the SpankRAT toolkit, flagging it as […] The post SpankRAT Exploits Windows Explorer Processes for Stealth and Delayed Detection appeared first on Cyber Security News.