FortiGuard Labs is aware that a new Remote Access Trojan (RAT) called Nerbian RAT was delivered to the targets via COVID-19 and World Health Organization (WHO) themed emails. Nerbian RAT is written in the Go programming language and performs keylogging and screen capture on the compromised machine.Why is this Significant?This is significant because Nerbrian RAT was delivered through emails that leverages COVID-19 and World Health Organization (WHO) themed lures that are still effective today to COVID themed to compel unsuspecting victims to open malicious attachments. The RAT is also capable of stealing sensitive information from the compromised machine through keylogging and screen capture.What is Nerbian RAT?Nerbian RAT is a Remote Access Trojan and is written in the Go programming language. The malware was delivered to the target through COVID-19 and WHO themed emails such as the following:The attached document file contains malicious macros, which downloads a dropper file after macros are enabled. The dropper performs anti-reversing and anti-VM checks before launching Nerbian RAT. The malware has an encrypted configuration file containing information such which Command and Control (C2) servers to connect to and connection intervals, how many times the RAT tries to transfer files and C2 backup domains.The malware performs typical RAT activities such as keylogging and screen capture.How Widespread is the Malware?The malware was reportedly to have been observed in Italy, Spain, and the United Kingdom. What is the Status of Coverage?FortiGuard Labs provides the following AV coverage against known samples of Nerbian RAT and associated files:VBA/Agent.XSQ!tr.dldrBAT/NerbianRAT.D!trMalicious_Behavior.SBRiskware/ApplicationW32/PossibleThreatPossibleThreat.PALLAS.HAll network IOC’s are blocked by the WebFiltering client.
More Stories
Oracle Quarterly Critical Patches Issued April 15, 2025
Multiple vulnerabilities have been discovered in Oracle products, which could allow for remote code execution. Read More
java-latest-openjdk-24.0.1.0.9-1.rolling.el8
FEDORA-EPEL-2025-a2514f7321 Packages in this update: java-latest-openjdk-24.0.1.0.9-1.rolling.el8 Update description: repacked April CPU 2025 Fixed alternatives priority Java-latest-openjdk updated to jdk 24...
Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful...
pgadmin4-9.2-1.fc41
FEDORA-2025-49d6f62c0e Packages in this update: pgadmin4-9.2-1.fc41 Update description: Update to pgadmin-9.2. Read More
java-latest-openjdk-24.0.1.0.9-1.rolling.el9
FEDORA-EPEL-2025-69dbee5b72 Packages in this update: java-latest-openjdk-24.0.1.0.9-1.rolling.el9 Update description: April 2025 CPU Fixed alternatives priority Java-latest-openjdk updated to jdk 24 Read...
java-latest-openjdk-24.0.1.0.9-1.rolling.el10_0 java-latest-openjdk-portable-24.0.1.0.9-1.rolling.el8
FEDORA-EPEL-2025-eb6bb14364 Packages in this update: java-latest-openjdk-24.0.1.0.9-1.rolling.el10_0 java-latest-openjdk-portable-24.0.1.0.9-1.rolling.el8 Update description: April 2025 CPU First jdk24 for epel10 Read More