{"id":8608,"date":"2024-04-11T13:44:38","date_gmt":"2024-04-11T04:44:38","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=8608"},"modified":"2024-11-21T13:47:27","modified_gmt":"2024-11-21T04:47:27","slug":"threat-actors-are-actively-using-pupy-rat-malware-to-attack-linux-systems","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/threat-actors-are-actively-using-pupy-rat-malware-to-attack-linux-systems\/","title":{"rendered":"Threat Actors Are Actively Using Pupy RAT Malware to Attack Linux Systems"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8608\" class=\"elementor elementor-8608\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8891c3a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8891c3a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-87e7a1a\" data-id=\"87e7a1a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4c51bc3 elementor-widget elementor-widget-text-editor\" data-id=\"4c51bc3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>A number of cyberattacks have been observed targeting Linux systems in Asian campaigns through the use of the Pupy Remote Access Trojan (RAT). The Pupy RAT&#8217;s intricate capabilities, including remote command execution, information theft, keylogging, and its ability to evade detection, make it a valuable tool for cybercriminals seeking to compromise and infiltrate systems in Asia region.<br \/><span style=\"color: var( --e-global-color-text ); letter-spacing: 0px;\"><br \/>In order to prevent phishing and social engineering attacks, organizations and individuals must maintain updated systems, utilize advanced threat detection solutions, and educate their users on the risks involved.<br \/><\/span><span style=\"color: var( --e-global-color-text ); letter-spacing: 0px;\"><br \/>A significant increase in reports of such campaigns targeting Asia should be closely monitored, as it indicates an increase in cyber threats within the Asian region, including Japan, and it is important for organizations to remain vigilant, adjust their defence\u2019s and refine their cybersecurity strategies in order to minimize the impact of targeted attacks.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>A number of cyberattacks have been observed targeting Linux systems in Asian campaigns through the use of the Pupy Remote Access Trojan (RAT). The Pupy RAT&#8217;s intricate capabilities, including remote command execution, information theft, keylogging, and its ability to evade detection, make it a valuable tool for cybercriminals seeking to compromise and infiltrate systems in Asia region. In order to<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":8616,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,9,2,1],"tags":[],"class_list":["post-8608","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-read_article","category-ransomware_criminals","category-ce_news","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2024\/11\/Pic1-1.jpg?fit=602%2C414&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8608"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=8608"}],"version-history":[{"count":8,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8608\/revisions"}],"predecessor-version":[{"id":8618,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8608\/revisions\/8618"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/8616"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=8608"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=8608"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=8608"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}