SugarGh0st RAT: Difference between revisions
Appearance
Content deleted Content added
No edit summary |
No edit summary |
||
Line 6: | Line 6: | ||
'''SugarGh0st [[Remote access trojan|RAT]]''' is a [[Microsoft Windows|Windows]] [[malware]] program utilized in [[Cyberattack|cyberattacks]] since August 2023.<ref>https://interestingengineering.com/science/sugargh0st-sneakychef-cyberespionage</ref><ref>https://thecyberexpress.com/sugargh0st-campaign-targets-ai-experts/</ref><ref>https://thehackernews.com/2024/05/china-linked-hackers-adopt-two-stage.html</ref><ref>https://www.darkreading.com/cyberattacks-data-breaches/us-ai-experts-targeted-in-sugargh0st-rat-campaign</ref> |
'''SugarGh0st [[Remote access trojan|RAT]]''' is a [[Microsoft Windows|Windows]] [[malware]] program utilized in [[Cyberattack|cyberattacks]] since August 2023.<ref>https://interestingengineering.com/science/sugargh0st-sneakychef-cyberespionage</ref><ref>https://thecyberexpress.com/sugargh0st-campaign-targets-ai-experts/</ref><ref>https://thehackernews.com/2024/05/china-linked-hackers-adopt-two-stage.html</ref><ref>https://www.darkreading.com/cyberattacks-data-breaches/us-ai-experts-targeted-in-sugargh0st-rat-campaign</ref> |
||
It was used to attack government agencies<ref>https://gbhackers.com/new-rat-malware-sneakychef-sugarghost-attack-windows-systems/</ref>, in EMEA and Asia<ref>https://blog.talosintelligence.com/sneakychef-sugargh0st-rat/</ref>. |
It was used to attack government agencies<ref>https://gbhackers.com/new-rat-malware-sneakychef-sugarghost-attack-windows-systems/</ref>, in EMEA and Asia<ref>https://blog.talosintelligence.com/sneakychef-sugargh0st-rat/</ref>. |
||
In 2024 it was reported an email phishing campaign using this malware targeting US [[Artificial intelligence|AI]] experts (for example, employees of [[OpenAI|OpenAI]] company).<ref>https://www.csoonline.com/article/2111003/us-ai-experts-targeted-in-cyberespionage-campaign-using-sugargh0st-rat.html</ref><ref>https://arstechnica.com/tech-policy/2024/10/using-chatgpt-to-make-fake-social-media-posts-backfires-on-bad-actors/</ref> |
In 2024 it was reported an email phishing campaign using this malware targeting US [[Artificial intelligence|AI]] experts (for example, employees of [[OpenAI|OpenAI]] company).<ref>https://www.csoonline.com/article/2111003/us-ai-experts-targeted-in-cyberespionage-campaign-using-sugargh0st-rat.html</ref><ref>https://arstechnica.com/tech-policy/2024/10/using-chatgpt-to-make-fake-social-media-posts-backfires-on-bad-actors/</ref><ref>https://www.infosecurity-magazine.com/news/sugargh0st-rat-targeted-ai/</ref> |
||
==See also== |
==See also== |
Revision as of 18:32, 12 October 2024
An editor has nominated this article for deletion. You are welcome to participate in the deletion discussion, which will decide whether or not to retain it. |
The topic of this article may not meet Wikipedia's general notability guideline. (October 2024) |
SugarGh0st RAT is a Windows malware program utilized in cyberattacks since August 2023.[1][2][3][4] It was used to attack government agencies[5], in EMEA and Asia[6]. In 2024 it was reported an email phishing campaign using this malware targeting US AI experts (for example, employees of OpenAI company).[7][8][9]
See also
References
- ^ https://interestingengineering.com/science/sugargh0st-sneakychef-cyberespionage
- ^ https://thecyberexpress.com/sugargh0st-campaign-targets-ai-experts/
- ^ https://thehackernews.com/2024/05/china-linked-hackers-adopt-two-stage.html
- ^ https://www.darkreading.com/cyberattacks-data-breaches/us-ai-experts-targeted-in-sugargh0st-rat-campaign
- ^ https://gbhackers.com/new-rat-malware-sneakychef-sugarghost-attack-windows-systems/
- ^ https://blog.talosintelligence.com/sneakychef-sugargh0st-rat/
- ^ https://www.csoonline.com/article/2111003/us-ai-experts-targeted-in-cyberespionage-campaign-using-sugargh0st-rat.html
- ^ https://arstechnica.com/tech-policy/2024/10/using-chatgpt-to-make-fake-social-media-posts-backfires-on-bad-actors/
- ^ https://www.infosecurity-magazine.com/news/sugargh0st-rat-targeted-ai/