Quasar RAT, an open-source remote access trojan, is leveraging DLL side-loading to infiltrate Windows hosts and steal data. The attack begins with an ISO image file, which contains malicious code that is hidden through DLL side-loading. A ‘FileDownloader.exe’ file is injected into the Windows Assembly Registration Tool, which triggers the trojan to establish connections with a remote server and send system information. The likely dissemination method is phishing emails.
![](https://healsecurity.com/wp-content/uploads/2024/07/group-ibs-threat-intelligence-and-defence-centre-equip-undergraduates-with-sophisticated.jpg)
Group-IB’s Threat Intelligence and Defence Centre Equip Undergraduates with Sophisticated Cybersecurity Technologies to Boost Threat Analysis and Enhance Cyber Resilience for Campus Start-ups
Hey there from the heart of the San Francisco Bay Area! It’s an absolute pleasure to have you back again for our chat on some