Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
ValleyRAT Strikes Again: New Malware Update Adds Sneaky Tricks to Its Arsenal
ValleyRAT malware is back with new tricks! This updated version, uncovered by cybersecurity researchers, now boasts features like screenshot capture and forced shutdown. ValleyRAT, the digital pest, continues to elude antivirus software while targeting Chinese-speaking users and Japanese organizations.

Hot Take:
ValleyRAT is back, folks, and it’s brought friends. With new tricks up its sleeves, it’s like the Swiss Army knife of malware – but instead of fixing things, it’s here to wreck your digital life. And just when you thought it was safe to open that Microsoft Word file, enter stage left: Agent Tesla, armed with the power of Excel Add-Ins. It’s a phish-eat-phish world out there!
Key Points:
- ValleyRAT is now equipped with new commands like capturing screenshots and forced shutdown.
- It’s distributed via phishing campaigns targeting Chinese-speaking users and Japanese organizations.
- A complex multi-stage infection process is used, including DLL side-loading and shellcode injection.
- Agent Tesla keylogger also returns, using Excel Add-Ins to infect Spanish-speaking victims.
- Both malware strains aim to collect sensitive information and evade detection.