NanoCore is a Windows Remote Access Trojan (RAT) that has been active in the wild since 2013. The RAT provides a wide range of functionality, enabling cybercriminals to do everything from stealing data to controlling the infected computer to mine cryptocurrency.
NanoCore is an example of a RAT, which is a type of malware designed to provide an attacker with access to and control over an infected machine. Like most RATs, NanoCore provides a wide range of capabilities, including:
NanoCore is one of the leading malware variants currently in operation. In fact, it was number ten in Check Point Research’s list of the top malware families.
Like many malware variants, spam and phishing emails is the primary way that the NanoCore RAT is spread. These emails will contain fake invoices, bank payment receipts, and similar malicious attachments.
Instead of a document or PDF, these files may be .img or .iso disk image files or specially formatted malicious ZIP files. All of these file types have the ability to store files. Once installed on a device, NanoCore establishes a connection with its command and control server and begins collecting and exfiltrating sensitive information from the infected computer. For example, the malware will steal and send login credentials cached by the user’s browser, email client, and similar software.
The malware also can deploy a range of other functions. For example, its keylogger can be used to collect additional passwords and other sensitive information entered into the computer. Alternatively, the cryptojacking malware can use the infected system’s processing power to mine cryptocurrency for the attacker’s benefit. NanoCore also enables the attacker to remotely control the infected computer, enabling them to perform a range of other functions manually and to deploy additional malware on the infected system.
The NanoCore RAT has been used in attacks targeting a wide range of industries. However, certain attack campaigns may be focused primarily on a particular industry. For example, past NanoCore campaigns have been mainly targeted toward healthcare, manufacturing, or other industry verticals. Since NanoCore is malware primarily delivered via phishing and spam emails, the pretext used may be focused on a particular industry. For example, fake invoices or requests for quotes may allegedly originate from a vendor within the target’s field.
NanoCore is a RAT that can cause significant harm to an organization and its users if their devices are infected. Some of the ways that an organization can protect itself against the NanoCore RAT include the following:
NanoCore is a leading malware variant, often appearing as one of the top ten most common malware variants each month. Protecting against this and similar malware variants is an essential component of a corporate cybersecurity strategy.
However, NanoCore is also only one of many different cybersecurity challenges that companies face on a regular basis. To learn more about the current state of the cybersecurity threat landscape and the threats that an organization should be protecting itself against, check out Check Point’s 2023 Cyber Security Report.
Check Point Harmony Endpoint provides companies with the ability to prevent, detect, and respond to malware infections — such as NanoCore — on an enterprise scale. To learn more about how Check Point can help your organization eliminate the threat that NanoCore poses, sign up for a free demo of Harmony Endpoint today.