Remove NanoCore RAT from Your System - How to, Technology and PC Security Forum |

Remove NanoCore RAT from Your System

Remote access Trojans, dubbed RATs for short, have been on the rise again. Cybercriminals employ them for various reasons – from financial gain to truly staggering spying sessions. Another NanoCore remote access Trojan recently has been detected to rove around the Web. Its highest rates of infection are found in USA and Canada.

Download a System Scanner, to See If Your System Has Been Affected By NanoCore Trojan.


The NanoCore Trojan is completed with premium plug-ins and specifically targets energy companies. Security experts believe that cyber criminals have started developing the threat back in 2013. Multiple variants have been detected since then, showing the different stages the Trojan has gone through.

NanoCore Development Stages

The Trojan was released for the first time while in alpha stage. It could be found on underground forums in December 2013, but it still didn’t have much of its current features.
Four beta versions have been leaked since then. Its complete variant – – was spread by attackers in March 2015 for a very small price. Anyone can buy a copy of the Trojan in exchange for $25 / €23. The low price and easy access to the Trojan led to its immediate worldwide spreading.

NanoCore Targeted Attacks

The Trojan has been noticed to aim at energy companies in the Middle East and Asia. As reported by security specialists, the attackers first proceeded by impersonating the address of a legit oil organization in South Korea, adding credibility to the bogus message. The files used to employ the attack are usually RTF or Word.
The exploited vulnerability – CVE-2012-0158 in Microsoft Windows Common Controls – has been known for quite some time. Software specialists note that the bug is present in a bundle of older products.

NanoCore Global Negative Impact

Experts have declared that the NanoCore last version is also suitable for less-experienced cybercriminals – it’s easy to find and cheap to buy. The Trojan proves to be a real kick for the career of every youngster wishing to develop malware. Researchers have also released information about the countries affected by the malicious attack. The highest rate of attacks is found in the United States, followed by Canada, Singapore, India, UK, and Hong Kong. Other targeted countries are Japan, Australia, United Arab Emirates, and Nigeria.

Spy Hunter system scanner will only detect the threat. If you want the threat to be automatically removed, you need to purchase the full version of the malware tool. Find Out More About SpyHunter Anti-Malware Tool

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum for 4 years. Enjoys ‘Mr. Robot’ and fears ‘1984’. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles!

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share