Party Vibe

Register

Welcome To

15 Arrested After Police Raids Targeting RATS

Forums The Vibe Chat 15 Arrested After Police Raids Targeting RATS

  • This topic is empty.
Viewing 8 posts - 1 through 8 (of 8 total)
  • Author
    Posts
  • 15 arrested in new European crackdown of peeping tom malware users | Ars Technica

    All malware sucks but having a full, stealthy, Remote Access Toolkit installed on the victims PC. I’d rather have money stolen than be unknowingly perved over for an unknown period of time.

    I pwned 16 BBC micros (+ the teachers server/SYST (root) account linked up on the old Econet system) with a RAT in 1986 and ragged a strict old battleaxe of a maths teacher

    She shut off the mains to her console monitor when typing in the system password (to no avail as I already had her keyboard buffer contents scrolling up on my screen); so I sent a bunch of BRK (reset) codes to half the workstations in the immediate vicinity and single ~ and @ characters to others; when she quizzed me as to what was going on I said “you taught us last week the codes for those characters – they are are mostly 1s in binary; perhaps something like a surge of strong voltage disrupted the network clock in that part of the class? :laugh_at:” (I’ve since learned the clock generator was that badly designed my cover story was actually feasible)

    we were singing UB40’s “Rat in Mi Kitchen” in class for months afterwards..

    but there would be no way me nor any of my mates would have done stuff like break into families computers and harrass girls/women and its fucking worrying that hackers think its OK to do so (especially when the hackers in worse political régimes now make use of the knowledge)

    The US government created most of these virus that go in an spy on you through your computer at home. Most of anti virus software companies like Norton assisted them stating it was in the “public’s best interest”, and I don’t see any of them going to jail for invading millions of American’s privacy?

    I think you’re maybe not familiar with the diffrences. The US government makes survailance tools with similar functionality but they are waaaaaaaaaaaaay more advanced than the Remote Access Trojans that were being used by those arrested

    Here’s a nice article explaining what they are and what can be done with them: Meet the men who spy on women through their webcams | Ars Technica

    Thanks! I’ll give it a read a little later today. I must be thinking of something else. What I was referring to is that it’s my understanding that several years back the original virus that infects and then allows your computer to be hacked in real time while sitting unused in your home was initiated by the US gov., but now is well known??

    The FBI and CIA had malware they could install on suspects PCs but that required a court order and were authorized for limited periods of use and those just recorded all activity on the target and send it back to the agents. They will have had some remote access capabilities probably far less than a RAT.

    Remote Access Trojans are just that, they rely onn tricking a user into installing a malicious file or as is often the case, some dirty bastard installs it himself on the computers of female customers to spy on them, but then that’s basically true no matter how it got there. These include functionality like this:
    Screen/camera capture or image control[2]
    File management (download/upload/execute/etc.)[3]
    Shell control (from command prompt)[4]
    Computer control (power off/on/log off if remote feature is supported)
    Registry management (query/add/delete/modify)[5]
    Hardware Destroyer (overclocker)[6]
    Other software product-specific functions
    ^^copypasta from wiki

    I believe many anti-virus software, kaspersky for definite, have said they will detect and flag a lawfully planted trojan if it has a signature for the specific malware used. The RATS will be detected by many anti-virus engines though some RATs are being developed to have rootkit capabilities.

    The NSA go to extrodinary lengths with both software and hardware implants used. I won’t bang on about details but if the NSA wanted to hack you, you’re already hacked.

    @Tryptameanie 577303 wrote:

    The FBI and CIA had malware they could install on suspects PCs but that required a court order and were authorized for limited periods of use and those just recorded all activity on the target and send it back to the agents. They will have had some remote access capabilities probably far less than a RAT.

    Remote Access Trojans are just that, they rely onn tricking a user into installing a malicious file or as is often the case, some dirty bastard installs it himself on the computers of female customers to spy on them, but then that’s basically true no matter how it got there. These include functionality like this:
    Screen/camera capture or image control[2]
    File management (download/upload/execute/etc.)[3]
    Shell control (from command prompt)[4]
    Computer control (power off/on/log off if remote feature is supported)
    Registry management (query/add/delete/modify)[5]
    Hardware Destroyer (overclocker)[6]
    Other software product-specific functions
    ^^copypasta from wiki

    I believe many anti-virus software, kaspersky for definite, have said they will detect and flag a lawfully planted trojan if it has a signature for the specific malware used. The RATS will be detected by many anti-virus engines though some RATs are being developed to have rootkit capabilities.

    The NSA go to extrodinary lengths with both software and hardware implants used. I won’t bang on about details but if the NSA wanted to hack you, you’re already hacked.

    Wow U Know Ur Stuff! Why beyond me, sometime I’ll PM you and tell u why I’m a little paranoid (as u put it “I was hacked” by our great transparent government)…………..Thanks!

    One “quick and dirty” way to check for any device sending back real time audio/video via your own network or broadband connection (it does require some network knowledge and ideally to be able to select your router and modem rather than accept the one the telephone / cable company give to you) is to ensure you can watch the “blinkenlights” on the router and/or any associated network hardware; and to make liberal use of switches (which are cheap).

    Audio and video streams produce a distinctive rate of flashing which is different from other network traffic. Also PC’s connected to a remote destination via RDP protocol (as the screen is being updated). Of course there may be legit devices producing this data but if you start with a router / modem you know is safe and only plug in devices one at a time (and are aware what their functions should be and what might be going on with a compromised device that may unearth which ones are the rogue one.

    These devices are interfaces for analogue telephones (you can see the switch just in the background). In this case they are 100% legit as I put them there 😉 but this should give an idea of what the network traffic “looks like” during real time audio transfer.

0

Voices

6

Replies

Tags

This topic has no tags

Viewing 8 posts - 1 through 8 (of 8 total)
  • You must be logged in to reply to this topic.

Forums The Vibe Chat 15 Arrested After Police Raids Targeting RATS