Summary

  • A new malware threat called Neptune RAT is targeting Windows devices, bypassing security protocols such as Windows Defender by exploiting sites including YouTube and Telegram.
  • Once activated, the malware allows remote access to the target computer, giving attackers the ability to lock files, steal passwords, change registry settings and wipe the master boot record.
  • The simplicity of the PowerShell commands used to activate the malware – irm (Invoke-RestMethod) and iex (Invoke-Expression) – has led experts to highlight the threat among non-technical users, who might easily be fooled into downloading malicious files.
  • Two simple steps can deactivate the commands in PowerShell and mitigate the threat from Neptune RAT, while non-technical users have been advised to avoid clicking on links in video descriptions, even from trusted sources, and to use an authenticator app for added security on their devices.

By Sayak Boral

Original Article