Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

Remote Access Trojan Was a Major Threat in 2019

cyber_lock
January 23, 2020

The rise in popularity of the Remote Access Trojan, or RAT, among financially motivated threat actors tracked by Proofpoint researchers, was a key highlight in 2019, which continues to gain popularity in 2020. 

According to a Proofpoint report, which analyzes RAT threats throughout 2019, actors that gained an affinity for RATs in 2019 include the highly prolific TA505, which introduced the FlawedGrace RAT along with a new backdoor, ServHelper, in early January last year and continued distributing RATs using two new downloaders, AndroMut and Get2, as well as a new RAT, SDBbot, over the summer. TA516, who can be viewed as a barometer for threat actor trends given the diversity of their malware payloads, spent a large portion of Q2 and Q3 2019 distributing Remcos RAT campaigns and ended its year with a new Remcos campaign on December 31, says Proofpoint. 

In Q1 2019:

  • TA505 started off in early January with a new backdoor, ServHelper, which was used to distribute the FlawedGrace RAT among other types of malware.
  • In February, Proofpoint researchers reported on phishing lures that mimicked job opportunities being used to distribute the More_eggs backdoor, which in turn, often downloaded RATs and other Trojans and stealers as secondary payloads.
  • In March, Proofpoint researchers reverse-engineered the configuration of Nymaim, an evolving downloader which has been used by numerous threat actors to download secondary payloads and to install its own modules for additional functionality.
  • Additionally, in March, Proofpoint researchers revealed the nature of the server-side components of Danabot, a popular banking Trojan that is offered as a “Malware-as-a-Service.”

In Q2 2019:

While traditional tried and true methods of creative phishing lures, credential dumps and exploiting legacy email protocols and APIs proved to continue to be effective TTPs for threat actors in Q2 of 2019, malware continued to evolve as well, say researchers at Proofpoint. In addition, RATs such as Netwire were used in tax-themed phishing email campaigns targeting financial organizations, and stealers such as KPOT continued to evolve with new features such as zero-persistence and in-memory execution to silently exfiltrate user credentials.

In Q3 2019:

  • The third quarter of 2019 was a particularly busy one, especially for the distribution of RATs and sophisticated multi-function, modular malware, says the report. In early July, TA505 returned with a new loader, AndroMut, in order to distribute the FlawedAmmy RAT.
  • In July and August, Proofpoint researchers observed the Chinese APT group, “Operation LagTime IT” targeting government IT agencies with the Cotx RAT, while another actor group used the so-called LookBack malware was used to target the utilities vertical in the United States. Lookback features a RAT module among other multi-function capabilities.
  • In September, PsixBot appeared with new sextortion capabilities, including the ability to capture on-screen video of a victim’s desktop based on keyword triggers, such as those used by adult content sites. 

In Q4 2019:

  • In October, TA505 doubled down on RAT distribution, with the introduction of SDBbot, which was paired with Get2, a new downloader that was also used in September to distribute the FlawedAmmy and FlawedGrace RATs.
  • In November, TA2101, a new threat actor on Proofpoint’s radar, was observed using stolen branding of German, Italian and U.S. government organizations in order to distribute Cobalt Strike, penetration testing software that is frequently abused as multifunction malware.
  • In December, Buer, a new downloader, appeared in an underground marketplace for sale to Russian-speaking threat actors, with a broad feature set that includes containerized installation and a user-friendly control panel. 

In 2019, tactics, techniques and procedures (TTPs) that exploited the Human Factor such as phishing lures and other forms of social engineering continued to be the primary threat to organizations worldwide, says Proofpoint. Robust malware such as banking Trojans like Ursnif and modular bots like Emotet were still the overall volume leaders among malware tracked by Proofpoint researchers. However, based on activity observed throughout the past year, even more, full-featured malware like RATs and backdoors are becoming increasingly common, concludes the report. 

For more information, visit Proofpoint.com

KEYWORDS: cyber security cybersecurity malware phishing Trojans

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • SEC0520-cyber-Feat-slide1_900px

    VivaVideo, “Spyware” App Maker, Contains Remote Access Trojan and Requests Dangerous App Permissions

    See More
  • partially open laptop with blue light

    Report shows rise in threat actors exploiting remote access software

    See More
  • 15% of Small Businesses Experienced a Cybersecurity Threat in 2019

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing