
The cyber community is alarmed by the appearance of a new remote access trojan, Sakura RAT, on GitHub. This malware is distinguished by a sophisticated camouflage system, successfully bypassing modern protections and providing full control over infected devices.
Sakura RAT combines the characteristics of several malicious frameworks, in particular Sakula, which is known for using HTTP GET and POST requests to manage C2 infrastructure. Its code contains parts similar to open projects on GitHub, such as Veil, Chimera, Process Herpaderping – tools for bypassing antivirus protection, which have long been a concern for specialists. Analysts note that the availability of such frameworks lowers the threshold of entry for new attackers, who can now create full-fledged RAT programs without deep technical knowledge.
The appearance of Sakura RAT is another confirmation that attackers are using open resources to create threats to corporate security. Experts are urging companies to implement multi-layered defenses, including behavioral-based EDR, application whitelisting, signature updates, macro disabling, and employee awareness of phishing.