Member-only story

A Malware retrospective: PrjRAPTOR

Jean-Pierre LESUEUR (Microsoft MVP)
Phrozen
Published in
9 min readSep 12, 2023

If you don’t have a Medium account, you can use this link to read the article. However, I highly encourage you to consider registering for a Medium account — not only to support this incredible platform but also to show appreciation for content creators. If you enjoyed the article, don’t forget to leave a clap — it means the world to us! Happy reading 👽!

Foreword

In our two previous articles in our “Malware Retrospective” series, we explored the stories behind two of the most well-known and popular Trojans from the late 90s and early 2000s. Most, if not all, enthusiasts in Malware/InfoSec have heard at least once about SubSeven or Beast, whether they are newcomers to the field or seasoned veterans.

Now, for the first time in the Malware Retrospective series, we will delve into the story of a lesser-known Remote Access Trojan called “PrjRAPTOR”. This Trojan gained popularity around 2008 and 2009, a period that marked the close of the Trojan scene’s golden era. It was a time before the creation of such programs turned into profit-driven enterprises by cyber criminals, rather than demonstrations of technical skill and genuine passion.

Let’s briefly dive into PrjRAPTOR’s story, a Remote Access Trojan that made waves for its unique interface. Our exclusive interview with its author, “Ryan,” offers valuable…

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in

Jean-Pierre LESUEUR (Microsoft MVP)
Jean-Pierre LESUEUR (Microsoft MVP)

Written by Jean-Pierre LESUEUR (Microsoft MVP)

Security & Malware Researcher / Developer at PHROZEN.

Responses (2)

What are your thoughts?