DiscoverCYFIRMA ResearchCYFIRMA Research- NonEuclid Remote Access Trojan (RAT)
CYFIRMA Research- NonEuclid Remote Access Trojan (RAT)

CYFIRMA Research- NonEuclid Remote Access Trojan (RAT)

Update: 2025-01-06
Share

Description

At CYFIRMA, we continuously analyze the tactics and techniques employed by threat actors. One such technique is Remote Template Injection, which exploits Microsoft Word's template functionality to bypass traditional defenses. Used by Advanced Persistent Threat (APT) groups, this method disguises malicious payloads in seemingly harmless documents, making it a potent tool in spear-phishing campaigns.
 
Our latest report uncovers how attackers exploit Word’s XML-based OOXML format to inject malicious templates, bypassing email filters and endpoint detection. We detail the technical execution, risks, and mitigation strategies.

Link to the Research Report: https://www.cyfirma.com/research/noneclid-rat/
 
Stay informed, stay secure. Read the full report to protect against this sophisticated threat! 

https://www.cyfirma.com/

Comments 
In Channel
loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

CYFIRMA Research- NonEuclid Remote Access Trojan (RAT)

CYFIRMA Research- NonEuclid Remote Access Trojan (RAT)

CYFIRMA