A Malware retrospective: PrjRAPTOR

<p>Inour two previous articles in our &ldquo;Malware Retrospective&rdquo; series, we explored the stories behind two of the most well-known and popular Trojans from the late 90s and early 2000s. Most, if not all, enthusiasts in Malware/InfoSec have heard at least once about&nbsp;<a href="https://darkcodersc.medium.com/a-malware-retrospective-subseven-d86fed0c88bf" rel="noopener">SubSeven</a>&nbsp;or&nbsp;<a href="https://darkcodersc.medium.com/a-malware-retrospective-the-beast-rat-1fcff07c5b3a" rel="noopener">Beast</a>, whether they are newcomers to the field or seasoned veterans.</p> <p>Now, for the first time in the Malware Retrospective series, we will delve into the story of a lesser-known Remote Access Trojan called &ldquo;<strong>PrjRAPTOR&rdquo;</strong>. This Trojan gained popularity around 2008 and 2009, a period that marked the close of the Trojan scene&rsquo;s golden era. It was a time before the creation of such programs turned into profit-driven enterprises by cyber criminals, rather than demonstrations of technical skill and genuine passion.</p> <p><a href="https://darkcodersc.medium.com/a-malware-retrospective-prjraptor-8f8884067845"><strong>Click Here</strong></a></p>
Tags: PrjRAPTOR