• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
RestorePrivacy

RestorePrivacy

Resources to stay safe and secure online

  • News
  • Tools
    • Secure Browser
    • VPN
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Password Manager
    • Secure Messaging App
    • Tor
    • Identity Theft Protection
    • Unblock Websites
    • Browser Fingerprinting
    • Privacy Tools
  • Email
    • Secure Email
    • ProtonMail Review
    • Tutanota Review
    • Mailfence Review
    • Mailbox.org Review
    • Hushmail Review
    • Posteo Review
    • Fastmail Review
    • Skiff Mail Review
    • StartMail Review
    • Runbox Review
    • Temporary Disposable Email
    • Encrypted Email
    • Alternatives to Gmail
  • VPN
    • What is VPN
    • VPN Reviews
    • VPN Comparisons
    • Best VPNs
    • VPN Coupons
    • VPN Routers
  • Password
    • Best Password Managers
    • KeePass Review
    • NordPass Review
    • 1Password Review
    • Dashlane Review
    • RoboForm Review
    • LastPass Review
    • Bitwarden Review
    • Strong Password
  • Storage
    • Best Cloud Storage
    • pCloud Review
    • Nextcloud Review
    • IDrive Review
    • SpiderOak Review
    • Sync.com Review
    • MEGA Cloud Review
    • NordLocker Review
    • Tresorit Review
    • Google Drive Alternatives
  • Messenger
    • Secure Messaging Apps
    • Signal Review
    • Telegram Review
    • Wire Review
    • Threema Review
    • Session Review
  • Info
    • Mission
    • Press
    • Contact
  • News
  • Tools
    • Secure Browser
    • VPN
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Password Manager
    • Secure Messaging App
    • Tor
    • Identity Theft Protection
    • Unblock Websites
    • Browser Fingerprinting
    • Privacy Tools
  • Email
    • Secure Email
    • ProtonMail Review
    • Tutanota Review
    • Mailfence Review
    • Mailbox.org Review
    • Hushmail Review
    • Posteo Review
    • Fastmail Review
    • Skiff Mail Review
    • StartMail Review
    • Runbox Review
    • Temporary Disposable Email
    • Encrypted Email
    • Alternatives to Gmail
  • VPN
    • What is VPN
    • VPN Reviews
    • VPN Comparisons
    • Best VPNs
    • VPN Coupons
    • VPN Routers
  • Password
    • Best Password Managers
    • KeePass Review
    • NordPass Review
    • 1Password Review
    • Dashlane Review
    • RoboForm Review
    • LastPass Review
    • Bitwarden Review
    • Strong Password
  • Storage
    • Best Cloud Storage
    • pCloud Review
    • Nextcloud Review
    • IDrive Review
    • SpiderOak Review
    • Sync.com Review
    • MEGA Cloud Review
    • NordLocker Review
    • Tresorit Review
    • Google Drive Alternatives
  • Messenger
    • Secure Messaging Apps
    • Signal Review
    • Telegram Review
    • Wire Review
    • Threema Review
    • Session Review
  • Info
    • Mission
    • Press
    • Contact

New ‘HotRAT’ Malware Disables Antivirus of Software Pirates

July 20, 2023 By Heinrich Long — Leave a Comment
New ‘HotRAT’ Malware Disables Antivirus of Software Pirates

A new variant of AsyncRAT named ‘HotRAT’ by cybersecurity analysts at Avast has been targeting internet users who download cracked and pirated software, including popular games and pro-grade tools.

HotRAT distributors source “clean” game and software cracks that are available online and infect them with a malicious AutoHotkey script hiding PowerShell code that turns off security software, establish persistence on the breached system, and eventually deploys the final malware payload using a VBS loader.

Installation of the malicious cracked software
Avast

The infection chain involves multiple stages, while the actual deployment of HotRAT using the Task Scheduler is illustrated below.

HotRAT’s loading chain
Avast

HotRAT gives attackers various capabilities, including stealing login credentials, targeting cryptocurrency wallets, capturing screenshots, logging key presses, accessing and modifying clipboard data, or fetching additional payloads from the attacker’s server.

HotRAT Details

Compared to AsyncRAT, an open-source malware that was used as the basis for the new malware family, HotRAT features an additional 20 commands, including for uninstalling AV tools from Avast, Malwarebytes, AVG, McAfee, and Avira, setting up proxies, killing specific processes, and stealing credentials for AnyDesk.

Also, the malware abuses its admin-level execution privileges to add the entire C:\ path into Windows Defender’s exclusion paths, essentially disabling all security alerts that would have warned users of malicious activity taking place on their system.

The cracks used for distributing HotRAT to unsuspecting users include:

  • Adobe Illustrator 2023
  • Far Cry 4 gold edition
  • Adobe Photoshop 2021
  • IObit Uninstaller Pro
  • Age of Empires IV Digital Deluxe Edition
  • Microsoft Office 2022
  • Battlefield 3 Premium Edition
  • Microsoft Office 2022 LTSC
  • Microsoft Office Professional Plus 2021
  • Nitro Pro Enterprise
  • CCleaner Professional
  • Sniper Elite 4 Deluxe Edition
  • Command & Conquer Red Alert 2
  • The Sims 4
  • CyberLink Screen Recorder Deluxe
  • Tiktok 18+ Plus PC Download
  • Topaz Video AI
  • Disk Drill Enterprise
  • Vmware Workstation pro
  • Wondershare Filmora

Avast’s infection stats show that HotRAT has been actively distributed to victims worldwide since last year, recording a significant spike of activity in mid-October 2022. Since then, Avast has been observing stable infection rates, so the HotRAT campaign is still active.

While the malware has infected computers in the United States, Europe, and Southeast Asia, the most impacted countries are Thailand, Libya, and Guyana, likely due to internet users in those places engaging more heavily in software piracy.

HotRAT’s global spread
Avast

Avast’s analysts report that most of the infected cracked software is distributed via websites that “specialize” in piracy and not via the usual suspect, aka torrents. Malicious forum posts promoting installers laced with the HotRAT script have also been observed.

Users are recommended to avoid all dubious software sources and abstain from software piracy entirely, as these downloads always come with an elevated risk for malware infection.

Related Articles:

  • AVrecon RAT Campaign Targeting Routers in the United States
  • Dota 2 Flaw Exploited by Malicious Game Mods Uploaded on Steam
  • Is Your Antivirus Software Spying on You?
  • AVG Secure VPN Review
  • Avast SecureLine VPN Review

About Heinrich Long

Heinrich is an associate editor for RestorePrivacy and veteran expert in the digital privacy field. He was born in a small town in the Midwest (USA) before setting sail for offshore destinations. Although he long chafed at the global loss of online privacy, after Edward Snowden’s revelations in 2013, Heinrich realized it was time to join the good fight for digital privacy rights. Heinrich enjoys traveling the world, while also keeping his location and digital tracks covered.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Sidebar

Digital Privacy Essentials:
Secure Browser
Private Search Engines
Secure Email
Best Password Managers
Secure Messaging Services
Best Ad Blockers
Best VPN Services
Secure Cloud Storage

Privacy & Security Guides:
Privacy Tools
Alternatives to Google Products
Firefox Privacy Modifications
Five Eyes, 9 Eyes, 14 Eyes Spying
Browser Fingerprinting
Is Tor Safe?
Alternatives to Gmail
VPN vs Tor
Alternatives to WhatsApp
Is Your Antivirus Spying on You?
Controlling Communication Channels is Crucial for Privacy
Anonymity Networks: VPNs, Tor, and I2P
How to Really Be Anonymous Online
Private and Anonymous Payments

Secure Email Reviews:
ProtonMail Review
Tutanota Review
Mailfence Review
Mailbox.org Review
Hushmail Review
Posteo Review
Fastmail Review
Runbox Review
CTemplar Review
Temporary Email Services
Encrypted Email

Password Manager Reviews:
Bitwarden Review
LastPass Review
KeePass Review
NordPass Review
Dashlane Review
1Password Review
Best Password Managers

Secure Messaging App Reviews:
Wire Review
Signal Review
Threema Review
Telegram Review
Session Review
Wickr Review

Secure Cloud Storage Reviews
Tresorit Review
MEGA Cloud Review
Sync.com Review
Nextcloud Review
IDrive Review
pCloud Review
SpiderOak Review
NordLocker Review

How To Guides
How to Encrypt Files on Windows
How to Encrypt Email
How to Configure Windows 10 for Privacy
How to use Two-Factor Authentication (2FA)
How to Secure Your Android Device for Privacy
How to Secure Your Home Network
How to Protect Yourself Against Identity Theft
How to Unblock Websites
How to Fix WebRTC Leaks
How to Test Your VPN
How to Hide Your IP Address
How to Create Strong Passwords
How to Really Be Anonymous Online

About RestorePrivacy

Contact

Restore Privacy Checklist

  1. Secure browser: Modified Firefox or Brave
  2. VPN: NordVPN [68% Off Coupon] or Surfshark
  3. Ad blocker: uBlock Origin or AdGuard
  4. Secure email: ProtonMail or StartMail
  5. Secure Messenger: Signal or Threema
  6. Private search engine: MetaGer or Brave
  7. Password manager: NordPass or Bitwarden

About

RestorePrivacy is a digital privacy advocacy group committed to helping people stay safe and secure online. You can support this project through donations, purchasing items through our links (we may earn a commission at no extra cost to you), and sharing this information with others. See our mission here.

We’re available for Press and media inquiries here.

RestorePrivacy is also on Twitter

COPYRIGHT © 2023 RESTORE PRIVACY, LLC · PRIVACY POLICY · TERMS OF USE · CONTACT · SITEMAP