FlawedAmmyy Rat Becomes One of the Most Potent Malware Threats

Written byHeloise Montini
Heloise Montini

Heloise Montini is a content writer whose background in journalism make her an asset when researching and writing tech content. Also, her personal aspirations in creative writing and PC gaming make her articles on data storage and data recovery accessible for a wide audience.

Edited byLaura Pompeu
Laura Pompeu

With 10 years of experience in journalism, SEO & digital marketing, Laura Pompeu uses her skills and experience to manage (and sometimes write) content focused on technology and business strategies.

Co-written byBogdan Glushko
Bogdan Glushko

CEO at SalvageData Recovery, Bogdan Glushko has over 18 years of experience in high-security data recovery. Over the years, he's been able to help restore data after logical errors, physical failures, or even ransomware attacks, for individuals, businesses, and government agencies alike.

I think there's an issue with my storage device, but I'm not sure
Start a free evaluation

Each month, Check Point releases its 10 most potent malware threats. And for the first time ever, it announced that a remote access Trojan (also known as a RAT) cracked their Top 10 list. The name of this malware is FlawedAmmyy.

Meet FlawedAmmyy

What makes this attack so potent is the hackers’ ability to access everything remotely. How it works, according to ZDNet is its built on top of the source code of leaked Ammyy Admin remote software. Once a user unintentionally downloads it via a file transfer or email attachment, it provides thieves backdoor access to the victim’s computer. From there, they control the microphone, camera, as well as have full access to everything you do. This might involve stealing login credentials when visiting financial websites, creating target lists of people who you contact regularly, and more. “While we have detected several campaigns distributing the FlawedAmmyy RAT in recent months, the latest campaign was easily the largest in terms of widespread impact,” remarked Checkpoint’s threat intelligence manager Maya Horowitz to ZDNet.

Trends Show Cryptomining Ransomware Remains Biggest Threat

Check Point’s list revealed that of the Top 10 threats, cryptomining continues to be the biggest influencer. Two of the most dangerous risks involve Coinhive and Cryptoloot. Cryptoloot, in particular, grows as a threat due to its ability to use existing resources for cryptomining, and it requests a smaller percentage of revenue relative to other threats, according to Check Point.Along with its Top 10 List, Check Point released its three biggest mobile threats for the last month. They are Triada, Lokibot, and Hiddad. Of note is Lokibot. This Trojan gathers data then allows the attacker to lock a victim’s device until they pay a ransom.

Security Tips

Knowing the latest threat trends helps you to understand where and how thieves attack devices. Armed with this information, it assists you in creating a proactive plan. As part of this plan:[icon name="arrow-circle-down" class="" unprefixed_class=""] Update all software on your devices since they might include patches that fix security vulnerabilities.[icon name="calendar-times-o" class="" unprefixed_class=""] Refrain from downloading attachments or apps from unknown sources, third-party marketplaces, and most important from your email.[icon name="download" class="" unprefixed_class=""] Download anti-virus and antimalware software and update each regularly. [icon name="file" class="" unprefixed_class=""] Create an offline backup so if your files become stolen, you have access to them.Speaking of losing files, we understand how bewildering that experience is. This is why we have a team of recovery experts standing by to assist you. When the unthinkable happens, trust the team at SALVAGEDATA to make your recovery. Contact us today to learn more.

Share this article

Related services

These are the most commonly requested data recovery services. At our headquarters' cleanroom lab, our certified engineers conduct a thorough review of any type of physical storage device, determining if there is logical or physical damage and carefully restoring all of the lost files.ces.

External Drive Data Recovery

We recover data from both external SSD and HDD drives. Rely on certified experts to restore your important files from damaged or corrupted external drives.

/services/data-recovery/external-drive/

Hard Drive Data Recovery

Recover data from all brands of HDD, PC hard drives, and hybrid disks. Our specialists ensure fast and secure recovery for any data loss scenario.

/services/data-recovery/hard-drive/

NAS Data Recovery

Recover data from NAS devices, including RAID configurations. Our team handles all types of NAS systems and ensures data recovery with minimal downtime.

/services/data-recovery/nas/

RAID Data Recovery

Our RAID data recovery services cover RAID 0, 1, 5, 10, and other configurations. We offer expert solutions for failed, degraded, or corrupted RAID arrays.

/services/data-recovery/raid/

SAN Data Recovery

Our team specializes in handling SAN devices from leading manufacturers like Dell EMC, HP, and IBM, ensuring efficient recovery with minimal disruption to your operations.

/services/data-recovery/san/

SD Card Data Recovery

Our recovery experts specialize in restoring data from SD and memory cards. We guarantee quick recovery with a no-data, no-charge policy.

/services/data-recovery/sd-card/

SSD Data Recovery

Our data recovery experts handle all SSD data loss scenarios with advanced tools, ensuring maximum recovery with high-security protocols.

/services/data-recovery/ssd/

USB Flash Drive Data Recovery

Recover lost data from USB flash drives, regardless of the damage or brand. We offer free in-lab evaluations to assess data recovery needs.

/services/data-recovery/usb-flash-drive/

If you’re unsure about which data recovery service to choose, let our team assist you in selecting the appropriate solutions. We understand the anxiety that comes with a sudden drive failure, and we are more prompt in our actions compared to other recovery service providers.