Fake Amnesty International Scanner Used to Infect Windows

October 1, 2021

Threat actors are now using Sarwent, a malware that mimics Amnesty International’s legitimate scanner, to scan systems for traces of Pegasus and remove them to infect Windows.

While the tactics of previous campaigns remain unclear, researchers at Cisco Talos recently announced a new attack when the malware was delivered via a fake Amnesty International website promoting Anti-Pegasus AV.

Based on an investigation that examined the administration panel of a Sarwent Command and Control server, the malware mainly reached users in the U.K.

Further research shows that Sarwent, written in Delphi, has remote access tool and allows direct access to the machine by activating the Remote Desktop Protocol or the Virtual Network Computing system.

According to researchers at Cisco Talos, the graphical user interface that Sarvent masquerades as an antivirus solution gives a clear indication that the threat actor behind the malware already has access to its source code.

For more information, read the original story in Bleeping Computer.

Top Stories

Related Articles

April 1, 2026 Anthropic has inadvertently exposed the full source code of its Claude Code tool for the second time more...

April 1, 2026 Cisco suffered a cyberattack after attackers used stolen credentials from a compromised developer tool to access its more...

March 30, 2026 Google has expanded its “Results about you” tool, allowing users to remove highly sensitive personal data, including more...

March 27, 2026 Microsoft is updating GitHub Copilot to train on real-world developer interactions, expanding beyond public code datasets to more...

Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.
Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn