New GodRAT Trojan Targets Trading Firms Using Steganography and Gh0st RAT Techniques

August 19, 2025
Malware / Cyber Attack

Financial institutions, particularly trading and brokerage firms, are currently facing a new threat from a remote access trojan known as GodRAT. According to Kaspersky researcher Saurabh Sharma, this malware is spread through malicious .SCR (screen saver) files disguised as financial documents sent via Skype Messenger. Active as recently as August 12, 2025, the attacks utilize steganography to hide shellcode within image files, enabling the download of the malware from a command-and-control (C2) server. Since September 9, 2024, these screen saver artifacts have targeted regions including Hong Kong, the United Arab Emirates, Lebanon, Malaysia, and Jordan. Based on Gh0st RAT, GodRAT employs a plugin-based architecture to enhance its capabilities for gathering sensitive information and delivering additional payloads like AsyncRAT.

Emerging GodRAT Trojan Targets Trading Firms with Steganographic Techniques

On August 19, 2025, cybersecurity firm Kaspersky disclosed a significant new threat affecting trading and brokerage firms: a remote access Trojan (RAT) dubbed GodRAT. This new malware leverages a technique known as steganography to conceal its malicious code within image files, facilitating its delivery and execution while evading detection.

The GodRAT campaign has recently employed a clever distribution method through Skype messenger, with hackers sending seemingly innocuous .SCR (screen saver) files masquerading as legitimate financial documents. According to Kaspersky researcher Saurabh Sharma, the attacks have been active as recently as August 12, 2025. The Trojan is believed to be inspired by the well-known Gh0st RAT, which has laid the foundation for GodRAT’s functionalities.

The operational footprint of this malicious activity extends to several regions, including Hong Kong, the United Arab Emirates, Lebanon, Malaysia, and Jordan. The earliest signs of this malware variant were detected in September 2024, highlighting a prolonged engagement with its targets.

GodRAT employs a modular design optimized for flexibility, utilizing plugins to enhance its capabilities. This design enables attackers to steal sensitive information and deploy additional malicious payloads, such as AsyncRAT, thereby multiplying the impact of the initial breach. The Trojan’s operation is indicative of current adversarial tactics that rely on obfuscation techniques and social engineering, which are consistent with the MITRE ATT&CK framework.

In terms of tactical maneuvering, GodRAT demonstrates initial access through phishing tactics, often executed via curated screen saver files that appeal to unsuspecting recipients. The use of steganography not only aids in bypassing standard security measures but also aligns with persistence tactics that attackers use to maintain long-term access to their victims’ networks.

Privilege escalation tactics may also be in play, as the Trojan’s dynamic plugins can be designed to exploit vulnerabilities within the targeted systems, thereby granting attackers elevated user roles. This capability significantly increases the potential damage, facilitating deeper intrusions into victim environments.

As technology practices evolve, so too do the methods employed by cybercriminals. Business owners in the financial sector are advised to remain vigilant and proactive in employing multi-layered security protocols, including regular updates to anti-malware solutions and employee training to identify phishing attempts. The GodRAT campaign underscores the importance of staying informed about emerging threats and adapting strategies to combat them effectively.

In light of these developments, organizations are encouraged to review their cybersecurity measures in alignment with the ever-evolving threat landscape, leveraging resources such as the MITRE ATT&CK framework for enhanced awareness and preparedness against similar attacks.

Source link