Backdoor

RAT

Nosviak4

Nosviak4

Nosviak4 is a backdoor and Remote Access Trojan (RAT) used for espionage. First seen in 2024, it has been used in multiple espionage campaigns. It allows access to compromised systems, to monitor, exfiltrate data and execute commands remotely. It’s stealthy and powerful, a threat to targeted orgs.

Key Insights

Key Insights

Nosviak4 is a C2 app and supports multiple callback protocols (Mirai, Qbot). Allows attackers to get persistent access and remote control of infected machines. Despite its capabilities, it’s not been researched or scrutinized as much as other systems.

Cybercrime and Espionage

The malware is used for botnet activities and provides DDoS and proxy services under the guise of "stress testing" tools. The infrastructure of Nosviak4 is spread across multiple countries, making attribution hard. It’s flexible and can be used for espionage, and financial fraud.

Evolving Threat and Future Risks

Researchers have seen the presence of Nosviak4 increasing, but there’s not much analysis. The fact that the source code is in underground repositories means it can evolve further and new, more complex variants can emerge. The number of infected hosts is growing, and it can scale into a bigger and more dangerous threat.

Known Variants

Known Variants

The Nosviak malware family has multiple variants, Nosviak2 and Nosviak4. These have different functionality and level of sophistication. Nosviak2 source code was found in underground GitHub repositories, used in multiple botnet operations.

The Nosviak malware family has multiple variants, Nosviak2 and Nosviak4. These have different functionality and level of sophistication. Nosviak2 source code was found in underground GitHub repositories, used in multiple botnet operations.

Mitigation Strategies

Mitigation Strategies

  • Monitor network for unusual traffic patterns of C2 communications.

  • Keep systems up to date and patch vulnerabilities exploited by Nosviak4.

  • Deploy IDS with Nosviak4 IOCs signatures.

  • Educate staff on phishing and social engineering tactics to prevent initial infection vectors.

Targeted Industries or Sectors

Targeted Industries or Sectors

Nosviak4 is used in botnet operations offering DDoS and proxy services under the guise of "stress testing" tools. These services target multiple industries, gaming and online services, by disrupting their operations.

Nosviak4 is used in botnet operations offering DDoS and proxy services under the guise of "stress testing" tools. These services target multiple industries, gaming and online services, by disrupting their operations.

Associated Threat Actors

Associated Threat Actors

The threat actors behind Nosviak4 are not known. But the infrastructure of Nosviak4 is big, over 150 hosts in 20 countries and autonomous systems. This means a coordinated effort from a group or multiple entities.

The threat actors behind Nosviak4 are not known. But the infrastructure of Nosviak4 is big, over 150 hosts in 20 countries and autonomous systems. This means a coordinated effort from a group or multiple entities.

References

    Related Posts:

    Rekoobe Backdoor Discovered in Open Directory, Possibly Targeting TradingView Users
    Oct 24, 2024

    Rekoobe Backdoor Discovered in Open Directory, Possibly Targeting TradingView Users

    Rekoobe Backdoor Discovered in Open Directory, Possibly Targeting TradingView Users
    Oct 24, 2024

    Rekoobe Backdoor Discovered in Open Directory, Possibly Targeting TradingView Users

    Rekoobe Backdoor Discovered in Open Directory, Possibly Targeting TradingView Users
    Oct 24, 2024

    Rekoobe Backdoor Discovered in Open Directory, Possibly Targeting TradingView Users

    Tracking Pyramid C2: Identifying Post-Exploitation Servers in Hunt
    Feb 12, 2025

    Tracking Pyramid C2: Identifying Post-Exploitation Servers in Hunt

    Tracking Pyramid C2: Identifying Post-Exploitation Servers in Hunt
    Feb 12, 2025

    Tracking Pyramid C2: Identifying Post-Exploitation Servers in Hunt

    Tracking Pyramid C2: Identifying Post-Exploitation Servers in Hunt
    Feb 12, 2025

    Tracking Pyramid C2: Identifying Post-Exploitation Servers in Hunt

    ToneShell Backdoor Used to Target Attendees of the IISS Defence Summit
    Sep 3, 2024

    ToneShell Backdoor Used to Target Attendees of the IISS Defence Summit

    ToneShell Backdoor Used to Target Attendees of the IISS Defence Summit
    Sep 3, 2024

    ToneShell Backdoor Used to Target Attendees of the IISS Defence Summit

    ToneShell Backdoor Used to Target Attendees of the IISS Defence Summit
    Sep 3, 2024

    ToneShell Backdoor Used to Target Attendees of the IISS Defence Summit