{"id":21758,"date":"2025-02-05T15:29:14","date_gmt":"2025-02-05T18:29:14","guid":{"rendered":"https:\/\/www.ethicalhacker.com.br\/site\/?p=21758"},"modified":"2025-02-05T15:35:16","modified_gmt":"2025-02-05T18:35:16","slug":"asyncrat-usa-payloads-python-e-tuneis-trycloudflare","status":"publish","type":"post","link":"https:\/\/www.ethicalhacker.com.br\/site\/2025\/02\/diversos\/asyncrat-usa-payloads-python-e-tuneis-trycloudflare\/","title":{"rendered":"AsyncRAT usa payloads Python e t\u00faneis TryCloudflare"},"content":{"rendered":"\n<p class=\"story-title\"><strong>Campanha AsyncRAT usa payloads Python e t\u00faneis TryCloudflare para ataques furtivos<\/strong><\/p>\n<p style=\"text-align: justify;\">Uma campanha de malware recentemente observada est\u00e1 distribuindo um\u00a0<strong>Remote Access Trojan (RAT)<\/strong>\u00a0chamado\u00a0<strong>AsyncRAT<\/strong>\u00a0por meio de\u00a0<strong>payloads em Python<\/strong>\u00a0e t\u00faneis\u00a0<strong>TryCloudflare<\/strong>. Essa campanha destaca como os atacantes est\u00e3o utilizando ferramentas leg\u00edtimas e t\u00e9cnicas avan\u00e7adas para realizar ataques furtivos e eficazes.<\/p>\n<p style=\"text-align: justify;\">Neste artigo, vamos explorar como essa campanha funciona, como voc\u00ea pode se proteger e, ainda, como a programa\u00e7\u00e3o em Python pode ser usada tanto para mitigar quanto para entender (em um contexto \u00e9tico) esses ataques. Vamos apresentar exemplos de scripts que podem ajudar a identificar e bloquear comportamentos maliciosos.<\/p>\n<p>\u00a0<\/p>\n<p><strong>O que \u00e9 o AsyncRAT?<\/strong><\/p>\n<p style=\"text-align: justify;\">O\u00a0<strong>AsyncRAT<\/strong>\u00a0\u00e9 um trojan de acesso remoto que explora o padr\u00e3o\u00a0<strong>async\/await<\/strong>\u00a0para comunica\u00e7\u00e3o ass\u00edncrona eficiente. Ele permite que os atacantes controlem sistemas infectados de forma furtiva, exfiltrem dados e executem comandos enquanto permanecem ocultos. Essa capacidade o torna uma amea\u00e7a cibern\u00e9tica significativa.<\/p>\n<p style=\"text-align: justify;\">A campanha come\u00e7a com um\u00a0<strong>e-mail de phishing<\/strong>\u00a0que cont\u00e9m um link para o Dropbox. Ao clicar no link, um arquivo ZIP \u00e9 baixado. Dentro do ZIP, h\u00e1 um arquivo de atalho da internet (URL) que redireciona para um arquivo\u00a0<strong>LNK<\/strong>\u00a0do Windows. Esse arquivo LNK, por sua vez, executa um c\u00f3digo JavaScript via PowerShell, que baixa e executa um script em lote (BAT). Esse script \u00e9 respons\u00e1vel por baixar um segundo arquivo ZIP contendo o payload em Python que instala o AsyncRAT e outros malwares, como\u00a0<strong>Venom RAT<\/strong>\u00a0e\u00a0<strong>Xworm<\/strong>.<\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEimpRrL-4nLzVS4EC2jiAlR-YlnArsObQMASBKqJbseQsb2AYBhWMmgRUx6LP2xIcRZe58dAVn6kN14xA5vfC9oJAzyrg28I1rCn4wqJkoAbK3SXVMS2-kmAqd8ZWExNyNzOVaQB5gTJazo-NvvF0mwggnLUnHzlN8cDMAL3XiN-ndwzLqZQMOQSHDDfYgW\/s728-rw-e365\/asynchrat.jpg\" class=\"gallery_colorbox\"><img decoding=\"async\" class=\"loaded aligncenter\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEimpRrL-4nLzVS4EC2jiAlR-YlnArsObQMASBKqJbseQsb2AYBhWMmgRUx6LP2xIcRZe58dAVn6kN14xA5vfC9oJAzyrg28I1rCn4wqJkoAbK3SXVMS2-kmAqd8ZWExNyNzOVaQB5gTJazo-NvvF0mwggnLUnHzlN8cDMAL3XiN-ndwzLqZQMOQSHDDfYgW\/s728-rw-e365\/asynchrat.jpg\"  alt=\"\" border=\"0\" data-original-height=\"96\" data-original-width=\"602\" \/><\/a><\/p>\n<p>\u00a0<\/p>\n<p><strong>Como o TryCloudflare \u00e9 usado?<\/strong><\/p>\n<p style=\"text-align: justify;\">O\u00a0<strong>TryCloudflare<\/strong>\u00a0\u00e9 um servi\u00e7o leg\u00edtimo oferecido pela Cloudflare que permite expor servidores web \u00e0 internet sem abrir portas. Ele cria um t\u00fanel tempor\u00e1rio (um subdom\u00ednio em\u00a0<strong>trycloudflare[.]com<\/strong>) que redireciona o tr\u00e1fego para o servidor do atacante. Nessa campanha, os criminosos usam o TryCloudflare para hospedar arquivos maliciosos e evitar detec\u00e7\u00e3o, aproveitando a confian\u00e7a associada ao nome Cloudflare.<\/p>\n<p>\u00a0<\/p>\n<p><strong>Mitiga\u00e7\u00e3o com Python: exemplos pr\u00e1ticos<\/strong><\/p>\n<p style=\"text-align: justify;\">A programa\u00e7\u00e3o em Python pode ser uma grande aliada na luta contra campanhas como essa. Abaixo, apresentamos dois exemplos de scripts que podem ajudar a identificar e bloquear atividades suspeitas.<\/p>\n<p>\u00a0<\/p>\n<p>1.\u00a0<strong>Detector de URLs maliciosas<\/strong><\/p>\n<p style=\"text-align: justify;\">Este script verifica se uma URL est\u00e1 em uma lista de dom\u00ednios suspeitos ou se cont\u00e9m palavras-chave associadas a golpes.<\/p>\n<p>\u00a0<\/p>\n<pre><strong><span class=\"token comment\"># Lista de dom\u00ednios suspeitos e palavras-chave<\/span>\ndominios_suspeitos <span class=\"token operator\">=<\/span> <span class=\"token punctuation\">[<\/span><span class=\"token string\">\"trycloudflare.com\"<\/span><span class=\"token punctuation\">,<\/span> <span class=\"token string\">\"dropbox.com\"<\/span><span class=\"token punctuation\">]<\/span>\npalavras_chave_golpes <span class=\"token operator\">=<\/span> <span class=\"token punctuation\">[<\/span><span class=\"token string\">\"login\"<\/span><span class=\"token punctuation\">,<\/span> <span class=\"token string\">\"credentials\"<\/span><span class=\"token punctuation\">,<\/span> <span class=\"token string\">\"password\"<\/span><span class=\"token punctuation\">,<\/span> <span class=\"token string\">\"update\"<\/span><span class=\"token punctuation\">]<\/span>\n\n<span class=\"token keyword\">def<\/span> <span class=\"token function\">verificar_url_suspeita<\/span><span class=\"token punctuation\">(<\/span>url<span class=\"token punctuation\">)<\/span><span class=\"token punctuation\">:<\/span>\n    url <span class=\"token operator\">=<\/span> url<span class=\"token punctuation\">.<\/span>lower<span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<\/span>\n    <span class=\"token keyword\">for<\/span> dominio <span class=\"token keyword\">in<\/span> dominios_suspeitos<span class=\"token punctuation\">:<\/span>\n        <span class=\"token keyword\">if<\/span> dominio <span class=\"token keyword\">in<\/span> url<span class=\"token punctuation\">:<\/span>\n            <span class=\"token keyword\">return<\/span> <span class=\"token string-interpolation\"><span class=\"token string\">f\"ATEN\u00c7\u00c3O: A URL <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>url<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\"> cont\u00e9m um dom\u00ednio suspeito: <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>dominio<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\">.\"<\/span><\/span>\n    <span class=\"token keyword\">for<\/span> palavra <span class=\"token keyword\">in<\/span> palavras_chave_golpes<span class=\"token punctuation\">:<\/span>\n        <span class=\"token keyword\">if<\/span> palavra <span class=\"token keyword\">in<\/span> url<span class=\"token punctuation\">:<\/span>\n            <span class=\"token keyword\">return<\/span> <span class=\"token string-interpolation\"><span class=\"token string\">f\"ATEN\u00c7\u00c3O: A URL <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>url<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\"> cont\u00e9m uma palavra-chave suspeita: '<\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>palavra<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\">'.\"<\/span><\/span>\n    <span class=\"token keyword\">return<\/span> <span class=\"token string\">\"A URL parece segura.\"<\/span>\n\n<span class=\"token comment\"># Exemplo de uso<\/span>\nurl_recebida <span class=\"token operator\">=<\/span> <span class=\"token string\">\"https:\/\/trycloudflare.com\/malicious-link\"<\/span>\n<span class=\"token keyword\">print<\/span><span class=\"token punctuation\">(<\/span>verificar_url_suspeita<span class=\"token punctuation\">(<\/span>url_recebida<span class=\"token punctuation\">)<\/span><span class=\"token punctuation\">)<br \/><br \/><br \/><\/span><\/strong><\/pre>\n<p>2.\u00a0<strong>Monitor de processos suspeitos<\/strong><\/p>\n<p style=\"text-align: justify;\">Este script monitora processos em execu\u00e7\u00e3o no sistema e alerta se detectar atividades suspeitas, como o uso de PowerShell para baixar scripts.<\/p>\n<p>\u00a0<\/p>\n<pre><strong><span class=\"token keyword\">import<\/span> psutil\n\n<span class=\"token comment\"># Lista de processos suspeitos<\/span>\nprocessos_suspeitos <span class=\"token operator\">=<\/span> <span class=\"token punctuation\">[<\/span><span class=\"token string\">\"powershell.exe\"<\/span><span class=\"token punctuation\">,<\/span> <span class=\"token string\">\"cmd.exe\"<\/span><span class=\"token punctuation\">,<\/span> <span class=\"token string\">\"python.exe\"<\/span><span class=\"token punctuation\">]<\/span>\n\n<span class=\"token keyword\">def<\/span> <span class=\"token function\">monitorar_processos<\/span><span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<\/span><span class=\"token punctuation\">:<\/span>\n    <span class=\"token keyword\">for<\/span> processo <span class=\"token keyword\">in<\/span> psutil<span class=\"token punctuation\">.<\/span>process_iter<span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">[<\/span><span class=\"token string\">'pid'<\/span><span class=\"token punctuation\">,<\/span> <span class=\"token string\">'name'<\/span><span class=\"token punctuation\">]<\/span><span class=\"token punctuation\">)<\/span><span class=\"token punctuation\">:<\/span>\n        <span class=\"token keyword\">if<\/span> processo<span class=\"token punctuation\">.<\/span>info<span class=\"token punctuation\">[<\/span><span class=\"token string\">'name'<\/span><span class=\"token punctuation\">]<\/span> <span class=\"token keyword\">in<\/span> processos_suspeitos<span class=\"token punctuation\">:<\/span>\n            <span class=\"token keyword\">print<\/span><span class=\"token punctuation\">(<\/span><span class=\"token string-interpolation\"><span class=\"token string\">f\"ATEN\u00c7\u00c3O: Processo suspeito detectado - PID: <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>processo<span class=\"token punctuation\">.<\/span>info<span class=\"token punctuation\">[<\/span><span class=\"token string\">'pid'<\/span><span class=\"token punctuation\">]<\/span><span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\">, <br \/>Nome: <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>processo<span class=\"token punctuation\">.<\/span>info<span class=\"token punctuation\">[<\/span><span class=\"token string\">'name'<\/span><span class=\"token punctuation\">]<\/span><span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\">\"<\/span><\/span><span class=\"token punctuation\">)<\/span>\n\n<span class=\"token comment\"># Exemplo de uso<\/span>\nmonitorar_processos<span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<\/span><\/strong><\/pre>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\"><span class=\"token punctuation\">Criar um script para\u00a0detectar e alertar sobre uma simula\u00e7\u00e3o de shell remoto\u00a0\u00e9 uma pr\u00e1tica importante para monitorar atividades suspeitas em um sistema. Abaixo, apresento um exemplo de script em Python que monitora conex\u00f5es de rede e processos em execu\u00e7\u00e3o para identificar poss\u00edveis tentativas de abrir um shell remoto. O script envia alertas quando detecta atividades suspeitas, como conex\u00f5es em portas incomuns ou processos de shell sendo executados.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><strong>Script de detec\u00e7\u00e3o e alerta de shell remoto<\/strong><\/p>\n<p>Este script monitora:<\/p>\n<ul>\n<li>\n<p><strong>Conex\u00f5es de rede<\/strong>: Verifica se h\u00e1 conex\u00f5es suspeitas em portas comuns usadas por shells remotos.<\/p>\n<\/li>\n<li>\n<p><strong>Processos em execu\u00e7\u00e3o<\/strong>: Detecta processos como\u00a0<code>bash<\/code>,\u00a0<code>sh<\/code>,\u00a0<code>cmd.exe<\/code>,\u00a0<code>powershell.exe<\/code>, etc., que podem indicar a execu\u00e7\u00e3o de um shell.<\/p>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Quando uma atividade suspeita \u00e9 detectada, o script envia um alerta (por exemplo, exibe uma mensagem no console ou envia um e-mail).<\/p>\n<p>\u00a0<\/p>\n<pre><strong><span class=\"token keyword\">import<\/span> psutil\n<span class=\"token keyword\">import<\/span> socket\n<span class=\"token keyword\">import<\/span> time\n<span class=\"token keyword\">import<\/span> smtplib\n<span class=\"token keyword\">from<\/span> email<span class=\"token punctuation\">.<\/span>mime<span class=\"token punctuation\">.<\/span>text <span class=\"token keyword\">import<\/span> MIMEText\n\n<span class=\"token comment\"># Configura\u00e7\u00f5es de alerta<\/span>\nALERTA_PORTA <span class=\"token operator\">=<\/span> <span class=\"token number\">9999<\/span>  <span class=\"token comment\"># Porta comum para shells remotos<\/span>\nALERTA_EMAIL <span class=\"token operator\">=<\/span> <span class=\"token string\">\"seu_email@dominio.com\"<\/span>\nSERVIDOR_SMTP <span class=\"token operator\">=<\/span> <span class=\"token string\">\"smtp.dominio.com\"<\/span>\nPORTA_SMTP <span class=\"token operator\">=<\/span> <span class=\"token number\">587<\/span>\nUSUARIO_SMTP <span class=\"token operator\">=<\/span> <span class=\"token string\">\"seu_email@dominio.com\"<\/span>\nSENHA_SMTP <span class=\"token operator\">=<\/span> <span class=\"token string\">\"sua_senha\"<\/span>\n\n<span class=\"token comment\"># Lista de processos suspeitos (shells)<\/span>\nPROCESSOS_SUSPEITOS <span class=\"token operator\">=<\/span> <span class=\"token punctuation\">[<\/span><span class=\"token string\">\"bash\"<\/span><span class=\"token punctuation\">,<\/span> <span class=\"token string\">\"sh\"<\/span><span class=\"token punctuation\">,<\/span> <span class=\"token string\">\"cmd.exe\"<\/span><span class=\"token punctuation\">,<\/span> <span class=\"token string\">\"powershell.exe\"<\/span><span class=\"token punctuation\">,<\/span> <span class=\"token string\">\"python\"<\/span><span class=\"token punctuation\">]<\/span>\n\n<span class=\"token keyword\">def<\/span> <span class=\"token function\">enviar_alerta<\/span><span class=\"token punctuation\">(<\/span>mensagem<span class=\"token punctuation\">)<\/span><span class=\"token punctuation\">:<\/span>\n    <span class=\"token triple-quoted-string string\">\"\"\"Envia um alerta por e-mail.\"\"\"<\/span>\n    <span class=\"token keyword\">try<\/span><span class=\"token punctuation\">:<\/span>\n        msg <span class=\"token operator\">=<\/span> MIMEText<span class=\"token punctuation\">(<\/span>mensagem<span class=\"token punctuation\">)<\/span>\n        msg<span class=\"token punctuation\">[<\/span><span class=\"token string\">\"Subject\"<\/span><span class=\"token punctuation\">]<\/span> <span class=\"token operator\">=<\/span> <span class=\"token string\">\"Alerta de Seguran\u00e7a: Shell Remoto Detectado\"<\/span>\n        msg<span class=\"token punctuation\">[<\/span><span class=\"token string\">\"From\"<\/span><span class=\"token punctuation\">]<\/span> <span class=\"token operator\">=<\/span> USUARIO_SMTP\n        msg<span class=\"token punctuation\">[<\/span><span class=\"token string\">\"To\"<\/span><span class=\"token punctuation\">]<\/span> <span class=\"token operator\">=<\/span> ALERTA_EMAIL\n\n        <span class=\"token keyword\">with<\/span> smtplib<span class=\"token punctuation\">.<\/span>SMTP<span class=\"token punctuation\">(<\/span>SERVIDOR_SMTP<span class=\"token punctuation\">,<\/span> PORTA_SMTP<span class=\"token punctuation\">)<\/span> <span class=\"token keyword\">as<\/span> servidor<span class=\"token punctuation\">:<\/span>\n            servidor<span class=\"token punctuation\">.<\/span>starttls<span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<\/span>\n            servidor<span class=\"token punctuation\">.<\/span>login<span class=\"token punctuation\">(<\/span>USUARIO_SMTP<span class=\"token punctuation\">,<\/span> SENHA_SMTP<span class=\"token punctuation\">)<\/span>\n            servidor<span class=\"token punctuation\">.<\/span>sendmail<span class=\"token punctuation\">(<\/span>USUARIO_SMTP<span class=\"token punctuation\">,<\/span> ALERTA_EMAIL<span class=\"token punctuation\">,<\/span> msg<span class=\"token punctuation\">.<\/span>as_string<span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<\/span><span class=\"token punctuation\">)<\/span>\n        <span class=\"token keyword\">print<\/span><span class=\"token punctuation\">(<\/span><span class=\"token string-interpolation\"><span class=\"token string\">f\"Alerta enviado para <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>ALERTA_EMAIL<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\">: <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>mensagem<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\">\"<\/span><\/span><span class=\"token punctuation\">)<\/span>\n    <span class=\"token keyword\">except<\/span> Exception <span class=\"token keyword\">as<\/span> e<span class=\"token punctuation\">:<\/span>\n        <span class=\"token keyword\">print<\/span><span class=\"token punctuation\">(<\/span><span class=\"token string-interpolation\"><span class=\"token string\">f\"Erro ao enviar e-mail: <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>e<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\">\"<\/span><\/span><span class=\"token punctuation\">)<\/span>\n\n<span class=\"token keyword\">def<\/span> <span class=\"token function\">monitorar_conexoes<\/span><span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<\/span><span class=\"token punctuation\">:<\/span>\n    <span class=\"token triple-quoted-string string\">\"\"\"Monitora conex\u00f5es de rede em busca de portas suspeitas.\"\"\"<\/span>\n    <span class=\"token keyword\">try<\/span><span class=\"token punctuation\">:<\/span>\n        conexoes <span class=\"token operator\">=<\/span> psutil<span class=\"token punctuation\">.<\/span>net_connections<span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<\/span>\n        <span class=\"token keyword\">for<\/span> conexao <span class=\"token keyword\">in<\/span> conexoes<span class=\"token punctuation\">:<\/span>\n            <span class=\"token keyword\">if<\/span> conexao<span class=\"token punctuation\">.<\/span>status <span class=\"token operator\">==<\/span> <span class=\"token string\">\"ESTABLISHED\"<\/span> <span class=\"token keyword\">and<\/span> conexao<span class=\"token punctuation\">.<\/span>laddr<span class=\"token punctuation\">.<\/span>port <span class=\"token operator\">==<\/span> ALERTA_PORTA<span class=\"token punctuation\">:<\/span>\n                mensagem <span class=\"token operator\">=<\/span> <span class=\"token string-interpolation\"><span class=\"token string\">f\"Conex\u00e3o suspeita detectada na porta <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>ALERTA_PORTA<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\"> <br \/>com <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>conexao<span class=\"token punctuation\">.<\/span>raddr<span class=\"token punctuation\">.<\/span>ip<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\">:<\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>conexao<span class=\"token punctuation\">.<\/span>raddr<span class=\"token punctuation\">.<\/span>port<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\">\"<\/span><\/span>\n                <span class=\"token keyword\">print<\/span><span class=\"token punctuation\">(<\/span>mensagem<span class=\"token punctuation\">)<\/span>\n                enviar_alerta<span class=\"token punctuation\">(<\/span>mensagem<span class=\"token punctuation\">)<\/span>\n    <span class=\"token keyword\">except<\/span> Exception <span class=\"token keyword\">as<\/span> e<span class=\"token punctuation\">:<\/span>\n        <span class=\"token keyword\">print<\/span><span class=\"token punctuation\">(<\/span><span class=\"token string-interpolation\"><span class=\"token string\">f\"Erro ao monitorar conex\u00f5es: <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>e<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\">\"<\/span><\/span><span class=\"token punctuation\">)<\/span>\n\n<span class=\"token keyword\">def<\/span> <span class=\"token function\">monitorar_processos<\/span><span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<\/span><span class=\"token punctuation\">:<\/span>\n    <span class=\"token triple-quoted-string string\">\"\"\"Monitora processos em execu\u00e7\u00e3o em busca de shells suspeitos.\"\"\"<\/span>\n    <span class=\"token keyword\">try<\/span><span class=\"token punctuation\">:<\/span>\n        <span class=\"token keyword\">for<\/span> processo <span class=\"token keyword\">in<\/span> psutil<span class=\"token punctuation\">.<\/span>process_iter<span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">[<\/span><span class=\"token string\">'pid'<\/span><span class=\"token punctuation\">,<\/span> <span class=\"token string\">'name'<\/span><span class=\"token punctuation\">]<\/span><span class=\"token punctuation\">)<\/span><span class=\"token punctuation\">:<\/span>\n            <span class=\"token keyword\">if<\/span> processo<span class=\"token punctuation\">.<\/span>info<span class=\"token punctuation\">[<\/span><span class=\"token string\">'name'<\/span><span class=\"token punctuation\">]<\/span> <span class=\"token keyword\">in<\/span> PROCESSOS_SUSPEITOS<span class=\"token punctuation\">:<\/span>\n                mensagem <span class=\"token operator\">=<\/span> <span class=\"token string-interpolation\"><span class=\"token string\">f\"Processo suspeito detectado: <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>processo<span class=\"token punctuation\">.<\/span>info<span class=\"token punctuation\">[<\/span><span class=\"token string\">'name'<\/span><span class=\"token punctuation\">]<\/span><span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\"> <br \/>(PID: <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>processo<span class=\"token punctuation\">.<\/span>info<span class=\"token punctuation\">[<\/span><span class=\"token string\">'pid'<\/span><span class=\"token punctuation\">]<\/span><span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\">)\"<\/span><\/span>\n                <span class=\"token keyword\">print<\/span><span class=\"token punctuation\">(<\/span>mensagem<span class=\"token punctuation\">)<\/span>\n                enviar_alerta<span class=\"token punctuation\">(<\/span>mensagem<span class=\"token punctuation\">)<\/span>\n    <span class=\"token keyword\">except<\/span> Exception <span class=\"token keyword\">as<\/span> e<span class=\"token punctuation\">:<\/span>\n        <span class=\"token keyword\">print<\/span><span class=\"token punctuation\">(<\/span><span class=\"token string-interpolation\"><span class=\"token string\">f\"Erro ao monitorar processos: <\/span><span class=\"token interpolation\"><span class=\"token punctuation\">{<\/span>e<span class=\"token punctuation\">}<\/span><\/span><span class=\"token string\">\"<\/span><\/span><span class=\"token punctuation\">)<\/span>\n\n<span class=\"token keyword\">def<\/span> <span class=\"token function\">main<\/span><span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<\/span><span class=\"token punctuation\">:<\/span>\n    <span class=\"token triple-quoted-string string\">\"\"\"Fun\u00e7\u00e3o principal do script.\"\"\"<\/span>\n    <span class=\"token keyword\">print<\/span><span class=\"token punctuation\">(<\/span><span class=\"token string\">\"[*] Iniciando monitoramento de shell remoto...\"<\/span><span class=\"token punctuation\">)<\/span>\n    <span class=\"token keyword\">while<\/span> <span class=\"token boolean\">True<\/span><span class=\"token punctuation\">:<\/span>\n        monitorar_conexoes<span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<\/span>\n        monitorar_processos<span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<\/span>\n        time<span class=\"token punctuation\">.<\/span>sleep<span class=\"token punctuation\">(<\/span><span class=\"token number\">10<\/span><span class=\"token punctuation\">)<\/span>  <span class=\"token comment\"># Verifica a cada 10 segundos<\/span>\n\n<span class=\"token keyword\">if<\/span> __name__ <span class=\"token operator\">==<\/span> <span class=\"token string\">\"__main__\"<\/span><span class=\"token punctuation\">:<\/span>\n    main<span class=\"token punctuation\">(<\/span><span class=\"token punctuation\">)<\/span><\/strong><\/pre>\n<p>\u00a0<\/p>\n<p><strong>Como se proteger?<\/strong><\/p>\n<ul>\n<li>\n<p><strong>Desconfie de e-mails n\u00e3o solicitados<\/strong>: Nunca clique em links ou baixe anexos de remetentes desconhecidos.<\/p>\n<\/li>\n<li>\n<p><strong>Verifique URLs e dom\u00ednios<\/strong>: Use ferramentas como o script acima para identificar URLs suspeitas.<\/p>\n<\/li>\n<li>\n<p><strong>Monitore processos em execu\u00e7\u00e3o<\/strong>: Fique atento a atividades suspeitas no seu sistema.<\/p>\n<\/li>\n<li>\n<p><strong>Mantenha-se atualizado<\/strong>: Aplique patches de seguran\u00e7a e use solu\u00e7\u00f5es antiv\u00edrus atualizadas.<\/p>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p><strong>Conclus\u00e3o<\/strong><\/p>\n<p style=\"text-align: justify;\">A campanha do AsyncRAT usando payloads em Python e t\u00faneis TryCloudflare \u00e9 um exemplo claro de como os atacantes est\u00e3o se tornando mais sofisticados. No entanto, com as ferramentas certas e um pouco de programa\u00e7\u00e3o, voc\u00ea pode se proteger. O Python \u00e9 uma linguagem poderosa que pode ser usada tanto para\u00a0mitigar\u00a0esses ataques quanto para\u00a0entender\u00a0como eles funcionam (em um contexto \u00e9tico).<\/p>\n<p style=\"text-align: justify;\">Lembre-se: a seguran\u00e7a cibern\u00e9tica come\u00e7a com voc\u00ea. Fique atento, mantenha-se informado e use as ferramentas dispon\u00edveis para proteger seus sistemas e dados.<\/p>\n<p>Fique seguro!<\/p>\n<p>\u00a0<\/p>\n<p>Fonte e imagens: <a href=\"https:\/\/thehackernews.com\/2025\/02\/asyncrat-campaign-uses-python-payloads.html?_m=3n%2e009a%2e3584%2eis0ao0d70p%2e2lsc\" target=\"_blank\" rel=\"noopener\">https:\/\/thehackernews.com\/2025\/02\/asyncrat-campaign-uses-python-payloads.html?_m=3n%2e009a%2e3584%2eis0ao0d70p%2e2lsc<\/a><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Campanha AsyncRAT usa payloads Python e t\u00faneis TryCloudflare para ataques furtivos Uma campanha de malware recentemente observada est\u00e1 distribuindo um\u00a0Remote Access Trojan (RAT)\u00a0chamado\u00a0AsyncRAT\u00a0por meio de\u00a0payloads em Python\u00a0e t\u00faneis\u00a0TryCloudflare. Essa campanha destaca como os atacantes est\u00e3o utilizando ferramentas leg\u00edtimas e t\u00e9cnicas avan\u00e7adas para realizar ataques furtivos e eficazes. Neste artigo, vamos explorar como essa campanha funciona, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":21771,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[100],"tags":[],"class_list":["post-21758","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-diversos"],"_links":{"self":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/21758","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/comments?post=21758"}],"version-history":[{"count":13,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/21758\/revisions"}],"predecessor-version":[{"id":21773,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/21758\/revisions\/21773"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media\/21771"}],"wp:attachment":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media?parent=21758"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/categories?post=21758"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/tags?post=21758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}