cognitive cybersecurity intelligence

News and Analysis

Search

Windows Defender Bypass Using PowerShell and Registry Edits in CyberEYE RAT

Windows Defender Bypass Using PowerShell and Registry Edits in CyberEYE RAT

Newly discovered remote access trojan (RAT) named CyberEye is causing concern in the cybersecurity community due to its advanced capabilities and use of Telegram for its command-and-control infrastructure. Unlike traditional malware, CyberEye uses Telegram’s Bot API for communication, data exfiltration, and command receipt, blending in with legitimate encrypted traffic. This makes it attractive and easily usable for cybercriminals with its customizable payload features and resilience on infected systems. All stolen data is directly sent to the attacker’s Telegram bot, making detection difficult.

Source: gbhackers.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts