Poison Ivy
Description
In college, I once showed my class the reality of Remote Access Trojans (RATs) with a live demo—showing how easily someone could take over a computer with the right tool. Years later, the real-world ramifications of these tools are even more chilling. Today, we’re diving deep into Poison Ivy, a notorious RAT that took the cybersecurity world by storm in the mid-2000s, and was linked to high-profile cyberattacks on government agencies, human rights organizations, and corporate giants.
//NO BS PODCAST HOSTING
🟡 Yellowball is a no BS podcast hosting service that I built and run. Whether you're looking to start a podcast, import an existing one, or just want to learn more, head over to https://yellowball.fm to check it out.
//REFERENCES
https://www.theregister.com/2012/08/31/nitro_hackers_abuse_java_exploit
https://www.darkreading.com/cyberattacks-data-breaches/poison-ivy-trojan-just-won-t-die
https://www.mandiant.com/sites/default/files/2021-09/rpt-poison-ivy.pdf
https://web.archive.org/web/20080208054011/http://www.poisonivy-rat.com/
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/poisonivy