In a recent cybersecurity investigation, a remote access tool with harmful capabilities has been brought to light. This tool, known for its deployment in cyberattacks against certain organizations, was allegedly developed by an individual using the pseudonym “Mr. Burns.” Active in the cybersecurity underworld since 2010, this developer is reputed for modifying legitimate remote administration software into malicious variants.
The cybersecurity entity that conducted the investigation, referred to here as the Federation Agency for Cyber Crime Tracking (F.A.C.C.T.), has been monitoring the tool, dubbed “BurnsRAT,” and its usage patterns. The agency suggests that the person behind “Mr. Burns” is believed to be a tech specialist hailing from Eastern Europe, with a focus on creating and distributing cyber tools with hidden malicious functions.
While the exact origins of BurnsRAT are not publicly confirmed due to the sensitive nature of such attributions, it is noted that the tool has been associated with cyber incidents targeting specific organizations. The purported developer is also linked to another cyber entity, “VasyGrek,” who is known for cyber activities against similar targets since the mid-2010s. It is reported that VasyGrek has utilized BurnsRAT for a number of years.
F.A.C.C.T., an offshoot of a global cybersecurity firm, has reportedly uncovered digital footprints such as social media and forum profiles that connect “Mr. Burns” and “VasyGrek.” These profiles are part of a broader network of cyber activities involving various tools and tactics, including deceptive emails designed to appear as financial transactions.
The latest known activity involving these cyber entities occurred in mid-2024, with an attack that remained undetected until recently. The rental of BurnsRAT is said to be priced at a significant sum, granting operators extensive control over compromised systems.
For ethical considerations, the personal details of individuals involved are withheld by the researchers, who have instead forwarded their findings to the appropriate law enforcement authorities for further action.
The response from local cyber law enforcement on these findings has not been disclosed, reflecting the ongoing and confidential nature of such cyber investigations.
