Python-Based PyRAT Targets Windows and Linux Systems

Related

Hackers Spread Vidar and GhostSocks Malware Through Claude Code Leak

What happened Hackers are weaponizing the leaked Claude Code source...

Cybersecurity Leaders to Watch in California’s Artificial Intelligence Industry

California’s artificial intelligence industry includes security leaders working across...

Cybersecurity Leaders to Watch in California’s IT & Software Sectors

California’s IT and software sectors continue to produce cybersecurity...

Cybersecurity Leaders to Watch in California’s Software Industry

California’s software industry remains one of the most influential...

Share

What happened

K7 Security Labs researchers identified a Python-based remote access trojan known as PyRAT that targets both Windows and Linux systems and provides attackers with persistent remote access capabilities. The malware was observed packaged as a Python executable and establishes command-and-control communication with a remote server over unencrypted HTTP. Upon execution, PyRAT collects system information from the infected host and transmits it to the command-and-control infrastructure in plain text. The malware implements operating system–specific persistence mechanisms, using registry-based startup entries on Windows systems and autostart mechanisms on Linux. PyRAT supports remote command execution and file interaction, allowing operators to control infected systems after deployment. The use of Python enables cross-platform compatibility while maintaining a consistent command-and-control design across environments.

Who is affected

Windows and Linux systems where the PyRAT malware is executed are directly impacted.

Why CISOs should care

Cross-platform remote access trojans increase exposure across heterogeneous enterprise environments.

3 practical actions

  • Scan for PyInstaller binaries. Identify suspicious Python executables.
  • Monitor HTTP C2 traffic. Detect unencrypted JSON communications.
  • Audit persistence mechanisms. Review startup entries and registry keys.