A recent leak on Telegram has exposed more than 80 Remote Access Trojans (RATs) and hacking tools, posing a significant threat to global cybersecurity.
The channel, linked to the website crackforyou[.]netlify[.]app, shared malicious software such as Slayer RAT, 888 RAT, Pegasus RAT, and GTX 700, raising alarms among malware analysts and cybersecurity experts.
This breach highlights the growing underground market for surveillance tools and the risks of weaponized exploits falling into unregulated hands.

Key Malware in the Leak
888 RAT (LodaRAT/Gaza007)
The 888 RAT is a multifunctional Android-targeting Trojan capable of remote device control, call monitoring, SMS interception, and credential theft via phishing pop-ups (e.g., fake Facebook login screens).
It can activate cameras, record audio, and exfiltrate files, making it a potent espionage tool.
Recent variants have expanded to Windows and Linux systems, with capabilities like shell command execution and toll fraud.
Pegasus RAT and Sarwent Campaigns
While the leak references “Pegasus RAT,” Pegasus itself is a state-grade spyware developed by NSO Group, not a traditional RAT.
It uses zero-click exploits to infiltrate iOS/Android devices, enabling access to messages, microphones, and location data.
Notably, attackers recently exploited Pegasus’s notoriety by impersonating Amnesty International’s website to distribute Sarwent RAT, a backdoor enabling direct desktop access and arbitrary malware execution.
GTX 700 Discrepancy
The inclusion of “GTX 700” is likely a misattribution, as this name corresponds to NVIDIA’s 2013 GPU series using Kepler/Maxwell architectures.
Cybersecurity researchers speculate the term might refer to an unrelated tool or a naming overlap.
Technical Insights and Infrastructure
- 888 RAT: Operates via C&C servers to gather device metadata (IP, OS, permissions) and deploy payloads. Its modular design allows updates for new exploits.
- Pegasus: Uses a Pegasus Anonymizing Transmission Network (PATN) with randomized subdomains and high-port infrastructure to evade detection. Recent forensic methods analyze iOS’s
shutdown.log
to identify infections. - Sarwent RAT: Masquerades as antivirus software, enabling remote desktop protocol (RDP) activation and secondary payload delivery.
Implications and Expert Analysis
The leak underscores the blurred lines between state-sponsored and financially motivated cybercrime. Tools like 888 RAT and Pegasus, often marketed for “national security,” are increasingly repurposed for criminal activities.
As noted by Cisco Talos, the use of Amnesty International’s branding demonstrates attackers’ psychological manipulation tactics, leveraging legitimate fears of surveillance to distribute malware.
Recommendations
- Enterprise Defense: Deploy endpoint detection (EDR) to flag unusual processes (e.g., unauthorized RDP activation).
- User Vigilance: Avoid unofficial app stores and scrutinize unsolicited links, especially those invoking high-profile threats like Pegasus.
- Forensic Tools: Use open-source utilities like Amnesty’s Mobile Verification Toolkit to detect spyware traces.
This incident highlights the critical need for international cooperation in regulating cyberweapons and mitigating the collateral damage of leaked exploits.
As RATs evolve in sophistication, proactive defense strategies are paramount to safeguarding digital ecosystems.
Also Read: