Draft:CyberEye RAT
![]() | Review waiting, please be patient.
This may take 4 weeks or more, since drafts are reviewed in no specific order. There are 492 pending submissions waiting for review.
Where to get help
How to improve a draft
You can also browse Wikipedia:Featured articles and Wikipedia:Good articles to find examples of Wikipedia's best writing on topics similar to your proposed article. Improving your odds of a speedy review To improve your odds of a faster review, tag your draft with relevant WikiProject tags using the button below. This will let reviewers know a new draft has been submitted in their area of interest. For instance, if you wrote about a female astronomer, you would want to add the Biography, Astronomy, and Women scientists tags. Editor resources
Reviewer tools
|
Submission declined on 22 June 2025 by Rambley (talk).
Where to get help
How to improve a draft
You can also browse Wikipedia:Featured articles and Wikipedia:Good articles to find examples of Wikipedia's best writing on topics similar to your proposed article. Improving your odds of a speedy review To improve your odds of a faster review, tag your draft with relevant WikiProject tags using the button below. This will let reviewers know a new draft has been submitted in their area of interest. For instance, if you wrote about a female astronomer, you would want to add the Biography, Astronomy, and Women scientists tags. Editor resources
This draft has been resubmitted and is currently awaiting re-review. | ![]() |
CyberEye is a modular remote access trojan (RAT) that primarily targets Microsoft Windows. Developed in .NET, it uses a GUI builder for payload customization and communicates with its operator through the Telegram Bot API.
Overview
[edit]CyberEye allows attackers to generate customized malware with features like keystroke logging, clipboard hijacking, screenshot capture, and credential theft. It includes anti-analysis methods such as virtual machine detection and disables Windows Defender via PowerShell scripts.
Technical Analysis
[edit]In June 2025, cybersecurity firm CYFIRMA published a technical analysis detailing CyberEye's architecture and behavior.[1] Other reports have appeared from:
References
[edit]- ^ "Understanding CyberEye RAT: Builder Capabilities and Implications". CYFIRMA. 2025-06-10. Retrieved 2025-06-22.
- ^ "CyberEye: The Telegram-Based RAT Targeting Windows Users". Ampcus Cyber. Retrieved 2025-06-22.
- ^ "X-Force Intelligence Alert: CyberEye Analysis". IBM X-Force Exchange. Retrieved 2025-06-22.
- in-depth (not just passing mentions about the subject)
- reliable
- secondary
- independent of the subject
Make sure you add references that meet these criteria before resubmitting. Learn about mistakes to avoid when addressing this issue. If no additional references exist, the subject is not suitable for Wikipedia.