Skip to main content

Hackers can easily watch your every move, control PCs with free NanoCore Trojan

Image used with permission by copyright holder

If your laptop or desktop is running Windows, you might want to make sure you’re up and running with the latest version of the operating system and your antivirus software. Researchers have discovered a new strain of the “NanoCore” remote access trojan (RAT), which could leave the most amateur hackers in complete control of your PC.

While RAT trojans have been around for some time, the latest trojan, known as NanoCore v1.2.2, is particularly dangerous. It is freely available for hackers to download on the dark web and can also easily be deployed to PCs. The most common method for deployment is via bogus “Urgent” phishing emails that typically contain fake order invoice documents with hidden malicious macro scripts. It is well known to security researchers but also can reach deep into the Windows registry and, even the network.

Recommended Videos

Once NanoCore 1.2.2 is deployed, hackers can remotely shut down and restart a PC, access files, the registry editor, control the mouse, open webpages, and even encrypt a PC with ransomware software. Even worse, hackers could disable the webcam lights on a PC and listen to or watch unsuspecting users every move.

Please enable Javascript to view this content

Although it appears NanoCore v1.2.2 must first be downloaded to a PC by unsuspecting users to spread its true impact, Forbes is warning that Windows users should still “Update Now” to avoid it. If you’re concerned, you can do this through Windows Update.

Still, a rise in the use of this particular version of NanoCore was first discovered in April, and it is especially dangerous since it is heavily modified. Unlike most trojans, this strain of NanoCore can be controlled with an easy-to-understand interface.

“Once downloaded from the Dark Web, the NanoCore RAT is controlled through a user-friendly interface. This lowers the barrier for entry and enables even the most amateur hackers to weaponize emails and kick off their own campaigns,” said security experts at Lmntrix Labs.

The spread of NanoCore v1.2.2 comes just a few weeks after security researchers found a separate security issue with the BIOS and drivers in newer Windows PCs. While some vendors have since patched this, according to MSPoweruser, hackers could also still be leveraging a flaw in the patch on Windows devices with older Intel CPUs to spread and deploy NanoCore 1.2.2.

Arif Bacchus
Arif Bacchus is a native New Yorker and a fan of all things technology. Arif works as a freelance writer at Digital Trends…
Razer mice could give hackers wide-open local access to your Windows PC
Razer Viper Ultimate Mouse

The security problems just keep coming for Windows. In the latest, a hacker has discovered that by simply using a Razer mouse, someone with bad intent who already has full physical access to your PC can run their own payloads and even abuse and enter the PowerShell command terminal.

A bit like the ongoing PrintNightmare vulnerability issue of injecting bad drivers via Point and Print, this new flaw has to deal with the way that Razer's gaming software works. Once a Razer mouse is plugged into a PC, Windows Update downloads and runs a "Razer installer" as a system process. This installer then allows hackers to open an elevated version of Windows Explorer to choose where to install drivers, and they can simply then open PowerShell by pressing the Shift and the right-click buttons on the keyboard. You can see this in action below.

Read more
China joins the global push for AI content regulation
AI chatbots.

Many international entities are pushing for better regulation of AI-generated content on the internet– and China’s government is the latest to reign in the use of the quickly developing technology.

According to Bloomberg, several government ministries have joined with the Chinese internet watchdog Cyberspace Administration of China (CAC) to announce a new mandate that will require internet users to identify any AI-generated content as such in a description or metadata encoding.

Read more
Nvidia RTX 50 series owners can unlock free GDDR7 memory speed boost
Screenshots of MSI Afterburner over a colorful background.

Popular graphics card monitoring and overclocking tool, MSI Afterburner, has received a beta update enabling owners of Nvidia’s RTX 50-series GPUs to boost their GDDR7 memory speeds by up to 10%. This enhancement allows data transfer rates to reach up to 36 gigatransfers per second (GT/s), surpassing Nvidia's standard specifications.

The RTX 50-series graphics cards are equipped with GDDR7 memory modules rated between 28GT/s and 32GT/s. However, Nvidia often sets default data transfer rates slightly lower, at 28GT/s for most models and 30GT/s for the RTX 5080, to ensure stability and longevity. The new update to MSI Afterburner unlocks the potential to exceed these factory settings, offering enthusiasts the opportunity to maximize their hardware's performance.

Read more