Malware, Threat Intelligence, Phishing

Updated DRAT trojan deployed in TAG-140 attack campaign

Cyber security concept. Toy horse on a digital screen, symbolizes the attack of the Trojan virus. 3D illustration.

Threat operation TAG-140, which has been associated with Pakistan-linked hacking groups Transparent Tribe and SideCopy, has deployed the significantly improved DRAT V2 remote access trojan in a social engineering attack campaign with ClickFix tactics aimed at Indian defense organizations, Cyber Security News reports.

Attackers used spear-phishing to lure targets into visiting a fake Indian Ministry of Defense press release portal with a link for March 2025 press releases, which redirected to a specialized URI leading to clipboard hijacking, mshta.exe exploitation for remote script execution, and the subsequent delivery of the BroaderAspect loader that eventually downloads the Delphi-based DRAT V2 malware, a report from Recorded Future's Insikt Group researchers showed. DRAT V2 not only allowed remote access but also enabled arbitrary shell command execution with its new "exec_this_comm" command, facilitating more flexible post-exploitation activities. Researchers also found that DRAT V2 had its TCP-based command-and-control protocol improved to include ASCII and Unicode support.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds