In an alarming trend highlighted in Check Point’s 2023 Mid-Year Security Report, seemingly legitimate software has become the preferred choice of cybercriminals. Notable examples are the Remcos Remote Access Trojan (RAT) and GuLoader, both advertised as legitimate tools but heavily utilized in cyberattacks, consistently ranking among the most prevalent malware. Although claim lawful usage, CPR found a strong connection between these tools and cybercrime […]