Skip to main content

This dangerous hacking tool is now on the loose, and the consequences could be huge

A dangerous post-exploitation toolkit, first used for cybersecurity purposes, has now been cracked and leaked to hacking communities.

The toolkit is being shared across many different websites, and the potential repercussions could be huge now that it can fall into the hands of various threat actors.

Brute Ratel logo.
Bleeping Computer

This could be bad. The post-exploitation toolkit in question, called Brute Ratel C4, was initially created by Chetan Nayak. Nayak is an ex-red teamer, meaning that his job included attempting to breach the securities of a given network, which was being actively defended by those on the blue team. Afterward, both teams discuss how it went and whether there are some security flaws to improve upon.

Recommended Videos

Brute Ratel was created for that exact purpose. It was made for “red teamers” to use, with the ultimate purpose of being able to execute commands remotely on a compromised network. This would then grant the attacker access to the rest of the network in an easier way.

Please enable Javascript to view this content

Cobalt Strike is seen as a similar tool to Brute Ratel, and that tool has been heavily abused by ransomware gangs, which is why it’s fairly easy to detect. Brute Ratel has not been quite as widely spread up until now, and it has a licensing verification system that mostly kept the hackers at bay. Nayak is able to revoke the license of any company found to be fake or misusing the tool.

Unfortunately, that’s now a thing of the past, because a cracked version of the tool started to circulate. It was first uploaded to VirusTotal in its uncracked state, but a Russian group called Molecules was able to crack it and entirely remove the licensing requirement from it. This means that now, any potential hacker can get their hands on it if they know where to look.

Will Thomas, a cyber threat intelligence researcher, published a report on the cracked version of the tool. It has already spread to many English and Russian-speaking communities, including CryptBB, RAMP, BreachForums, Exploit[.]in, Xss[.]is, and Telegram and Discord groups.

Person typing on a computer keyboard.
Image used with permission by copyright holder

“There are now multiple posts on multiple of the most populated cybercrime forums where data brokers, malware developers, initial access brokers, and ransomware affiliates all hang out,” said Thomas in the report. In a conversation with Bleeping Computer, Thomas said that the tool works and no longer requires a license key.

Thomas explained the potential dangers of the tech, saying, “One of the most concerning aspects of the BRC4 tool for many security experts is its ability to generate shellcode that is undetected by many EDR and AV products. This extended window of detection evasion can give threat actors enough time to establish initial access, begin lateral movement, and achieve persistence elsewhere.”

Knowing that this powerful tool is out there, in the hands of hackers who should never have gained access to it, is definitely scary. Let’s hope that antivirus software developers can tighten the defenses against Brute Ratel soon enough.

Monica J. White
Monica is a computing writer at Digital Trends, focusing on PC hardware. Since joining the team in 2021, Monica has written…
Destructive hacking group REvil could be back from the dead
Person typing on a computer keyboard.

There was a period in 2021 when the computing world was gripped by fear of a dizzyingly effective hacking group fittingly named REvil -- until its website was seized by the FBI and its members arrested by Russia’s security services, that is. Yet like a malevolent curse that just can’t be dispelled, it now seems the group’s websites are back online. Has the group returned to spread discord and wreak havoc once again?

In case you missed them the first time around, REvil came to global attention by hacking into various high-profile targets, pilfering secret documents, then threatening their release unless a ransom was paid. In a notable case, the group stole and published files from Apple supplier Quanta Computer, including some that spilled the beans on unreleased product designs.

Read more
Typing on a gamepad gets less annoying with this new Windows keyboard
An Xbox controller sits on a floor next to a stack on Xbox One games.

Anyone who has ever had to use a game controller for text inputs -- whether it's for logging into a service or typing a quick message -- knows what a frustrating experience it can be. While controllers are perfectly designed for gaming, they are a nightmare for typing with. But a new feature in Windows 11 aims to address that, as Microsoft is introducing a new keyboard layout for gamepads.

Among the updates in the new Windows 11 Build 26100.3613, rolling out this week to Windows Insiders, is a layout for the Windows touch keyboard that is specifically designed for use with a gamepad.

Read more
Nvidia might once again delay the GPU gamers want most
Two RTX 4060 graphics cards stacked on top of each other.

If a GPU is yet to be announced, can we consider it to be delayed? Maybe, maybe not, but if you trust leakers, Nvidia's upcoming best graphics cards for gamers on a budget are seemingly stuck in limbo. The RTX 5060 and the RTX 5060 Ti are said to be delayed once again, and gamers might have to wait for quite a long time to get their hands on one of the new RTX 50-series GPUs.

This grim update comes from Board Channels, which is a website frequented by people who claim to be affiliated with Nvidia's add-in board (AIB) partners. According to the report, the RTX 5060 Ti (in both its iterations, meaning the 8GB and the 16GB models) will now launch in mid-April, followed by the RTX 5060 in mid-May. Nvidia is said to have notified its AIBs about these delays.

Read more