Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

California and Pennsylvania student papers team up to heal from wildfires

AI startup Cohere gets Ottogrid, the platform for conducting market research

How to start a business in the age of AI (and now is the best time)

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Filless Remcos rats delivered via LNK files and MSHTA in PowerShell-based attacks
Identity

Filless Remcos rats delivered via LNK files and MSHTA in PowerShell-based attacks

userBy userMay 16, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cybersecurity researchers are shedding light on a new malware campaign that uses a PowerShell-based shellcode loader to deploy a remote access trojan called Remcos Rat.

“Threat officials deliver malicious LNK files embedded in ZIP archives, often disguising office documents,” Qualys security researcher Akshay Thorve said in a technical report. “The attack chain utilizes MSHTA.EXE for proxy execution early on.”

As Qualys details, the latest attacks tempt users to use tax-related lures to open malicious ZIP archives containing Windows Shortcuts (LNK) files.

The binary is used to run an obfuscated HTA file named “xlab22.hta” hosted on a remote server that incorporates Visual Basic Script code to download a visualshell script, a decoy PDF, and another HTA file similar to xlab22.hta called “311.hta”. The HTA file is configured to create changes to the Windows registry and to automatically start “311.hta” when the system starts up.

Once the PowerShell script is run, it decodes and rebuilds the shellcode loader that will eventually proceed to fully boot the REMCOS rat payload in memory.

Remcos Rat is a well-known malware that gives threat actors complete control over the compromised system, making it an ideal tool for cyber espionage and data theft. The 32-bit binaries compiled using Visual Studio C++8 have a modular structure that allows you to get a system metadata, log keystrokes, capture screenshots, clipboard data monitoring, and a list of all installed programs and execution processes.

Cybersecurity

Additionally, “Establish a TLS connection to a command and control (C2) server with ReadySteaurants[.]com, “Maintaining persistent channels for data delamination and control.

This is not the first time a greasy version of Remcos Rat has been discovered in the wild. In November 2024, Fortinet Fortiguard Labs detailed a phishing campaign that skillfully deployed malware by using order-themed lures.

What makes the attack method appealing to threat actors is that malicious code runs directly into computer memory and leaves almost a trace on disk, allowing it to work undetected by many traditional security solutions.

“The rise of Powershell-based attacks like the new Remcos rat variant shows that threat actors are evolving to avoid traditional security measures,” says J Stephen Kowski, field CTO at Slashnext.

“This fileless malware runs directly in memory by running obfuscated PowerShell scripts that can bypass traditional defenses using LNK files and MSHTA.exe. Advanced email security is important to detect and block malicious LNK attachments before reaching the user.

This disclosure details the new .NET loaders used by the Palo Alto Network Unit 42 and Thrare Tray to explode the wide range of product information steelers and rats, including Agents Tesla, Novastoler, Lenkosratt, Vicky Roger, Xologer, XWORM.

The loader features three stages that function in tandem to deploy the final stage payload. .NET executable embedding the second and third stages in an encrypted form.

“The previous versions incorporate the second stage as a hard-coded string, while more recent versions use bitmap resources,” Sleitrey said. “The first stage extracts this data, decrypts it, then runs it in memory to launch the second stage.”

Unit 42 described the use of bitmap resources to bypass traditional security mechanisms and hide malicious payloads that can bypass detection.

The findings are also consistent with the emergence of several phishing and social engineering campaigns designed for qualification theft and delivery of malware –

Use the Trojanized version of Keepass Password Management Software (CodeNead Keeloader) to drop cobalt strike beacons and steal sensitive Keepass database data, including management qualifications. The malicious installer is hosted in the Keepass Typosquat domain provided via Bing Ads. Using Clickfix lures and URLs embedded in PDF documents, as well as a set of intermediate dropper URLs for deploying Lumma Stealer. Using Booby-confined Microsoft Office documents used to deploy Formbook Information Stealer protected using a malware distribution service called Horus Protector. Load the qualification phishing page locally via phishing email using Blob Uris. BlobUris is provided using an Alow-Listed page (e.g. onedrive.live[.]com) It has been abused to redirect victims to malicious sites that contain links to actor-controlled HTML pages of threats. The use of RAR archives pose as setup files to distribute Netportrats in attacks targeting Ukraine and Poland. Use phishing emails to distribute HTML attachments containing malicious code to capture victim outlook, hotmail, and Gmail credentials and eliminate them in a telegram bot named “Blessed Logs” that has been active since February 2025.

Cybersecurity

This development is complemented by an increase in campaigns powered by AI (AI) that utilize real-time mutation polymorphic tricks. These include changing the email subject, sender name, and body content to slip past signature-based detections.

“AI has given threat actors the power to automate malware development, expand attacks across the industry, and personalize phishing messages with surgical accuracy,” says Cofense.

“These evolving threats can bypass traditional email filters, highlighting the impediment of perimeter-only defenses and the need for post-delivery detection, and have been able to beat traditional defenses through polymorphic phishing campaigns that shift content on the fly.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePeru arrests suspect in Gold Rush Massacre | Mining News
Next Article Ten hard-won lessons from a decade of mobility innovation
user
  • Website

Related Posts

New HTTPBOT BOTNET launches over 200 precision DDOS attacks against gaming and high-tech sectors

May 16, 2025

Top 10 Best Practices for Effective Data Protection

May 16, 2025

Researchers reveal flaws in new Intel CPUs that allow memory leaks and Specter V2 attacks

May 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

California and Pennsylvania student papers team up to heal from wildfires

AI startup Cohere gets Ottogrid, the platform for conducting market research

How to start a business in the age of AI (and now is the best time)

Florida’s only public HBCU chooses a lobbyist with ties to DeSantis as the next president

Trending Posts

Israel launches strikes in two Yemeni ports | Hotel News

May 16, 2025

Israel kills hundreds and destroys fatal week in Gaza | Israeli-Palestinian conflict news

May 16, 2025

NJ Transit workers will take a strike after wages increase. Worker Rights News

May 16, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

How to start a business in the age of AI (and now is the best time)

Openai launches Codex: a cloud agent for software engineers who write code, fix bugs, and handle tasks in parallel

Google One surges to 150 million subscribers after launching AI-powered plans

What is the fit in the product market? A quick guide for non-technical founders

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.