NEW CARDING CHAT IN TELEGRAM

Brute Ratel hacked: Hackers gained access to a powerful cyberwar tool

Carding Forum

Professional
Messages
2,788
Reputation
8
Reaction score
1,166
Points
113
Specialized software is now available to everyone without an activation key.

An activator for the current version of the Brute Ratel C4 (BRC4) post-exploitation tool has surfaced in the cybercrime community. This was announced on the second of July in his account on the social network X* by a cybersecurity researcher under the nickname @knight0x07.

70hkw0xr3rhxklv42a7kr63lod8allb9.png


The Brute Ratel tool, although less popular than Cobalt Strike, has similar C2 capabilities and was designed specifically to bypass threat detection systems such as EDR and antivirus programs. Virus analysts have confirmed the high efficiency of the tool in this regard.

On the developers website, Brute Ratel is described as an advanced software for simulating the actions of intruders and simulating attacks. The program helps security teams analyze attacks and improve defense mechanisms by providing systematic reports and graphs.

Nevertheless, attackers use such software even more often than researchers, so its belonging to specialized tools for information security experts is very conditional. The hacked version of Brute Ratel 1.4.5 can now be launched without an activation key and used by anyone.

The availability of the tool in the public domain raises serious concerns, as it generates shellcode that is not detected by many EDR and antivirus products. This gives attackers enough time to establish initial access, move around the network, and establish persistence.

Given the availability of advanced tools for attackers, organizations should strengthen the multi-level protection of their networks. It is recommended to regularly update security systems, conduct vulnerability audits, use modern EDR solutions, and implement zero-trust principles. It is also extremely important to train personnel to recognize cyber threats and correctly respond to any suspicious activity.

Source
 
Top