Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

ChatGPT advertises | Tech Crunch

China-linked UNC3886 targets Singapore’s telecom sector with cyber espionage

Discord to introduce age verification for full access to platform next month

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Asyncrat exploits ConnectWise ScreenConnect to steal credentials and ciphers
Identity

Asyncrat exploits ConnectWise ScreenConnect to steal credentials and ciphers

userBy userSeptember 11, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 11, 2025Ravi LakshmananMalware/Certifications

Cybersecurity researchers reveal details of a new campaign that leverages ConnectWise ScreenConnect, a legitimate remote monitoring and management (RMM) software, delivering a meatless loader that drops a remote access Trojan (RAT), called Asyncrat, to steal sensitive data from a reduced-down host.

“The attacker used ScreenConnect to gain remote access and ran a layered VBScript and PowerShell loader that retrieves and runs obfuscated components from external URLs,” LevelBlue said in a report shared with Hacker News. “These components are encoded .NET assemblies that are eventually deactivated to Asyncrat, while maintaining persistence via fake ‘Skype Updater’ scheduled tasks. ”

The infection chain documented by cybersecurity companies has shown that threat actors leverage the deployment of Screen Connect to launch remote sessions and start visual basic script payloads via keyboard activity.

“We’ve seen a Trojan screenconnect installer disguised as financial and other business documents sent via phishing emails,” Leadblue MDR SOC analyst Sean Shirley told Hacker News.

Audit and subsequent

The script is designed to use PowerShell scripts to retrieve two external payloads (“logs.ldk” and “logs.ldr”) from the attacker control server. The first of the two files is a DLL that is used to establish persistence using scheduled tasks by writing a secondary visual basic script on disk and by avoiding detection as “Skype Updater” and establishing saves using disks.

This visual basic script contains the same PowerShell logic observed at the start of the attack. Scheduled tasks ensure that the payload will run automatically every time you log in.

In addition to loading “logs.ldk” as a .NET assembly, the PowerShell script is passed as input to the load assembly, leading to the execution of the binary (“asyncclient.exe”). Browser extensions for Google Chrome, Brave, Microsoft Edge, Opera, and Mozilla Firefox.

All this collected information will eventually be extended to the Command and Control (C2) server (“3osch20.duckdns”[.]org”) via TCP socket, a malware beacon uses a beacon to perform a payload and receive commands after explosion. C2 connection settings are hardcoded or extracted from the remote path pebin URL.

“Fireless malware continues to pose major challenges to modern cybersecurity defenses due to its stealthiness and reliance on legitimate system tools for execution,” LevelBlue said. “Unlike traditional malware that writes payloads to disk, indelible threats work in memory, making them difficult to detect, analyze and eradicate.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCalifornia bill regulating AI companion chatbots is approaching the law
Next Article Durham scientists advance reactors in superconductor research
user
  • Website

Related Posts

China-linked UNC3886 targets Singapore’s telecom sector with cyber espionage

February 9, 2026

SolarWinds Web Help Desk exploited by RCE in multi-stage attack against public servers

February 9, 2026

AI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More

February 9, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

ChatGPT advertises | Tech Crunch

China-linked UNC3886 targets Singapore’s telecom sector with cyber espionage

Discord to introduce age verification for full access to platform next month

Turning lignocellulosic biomass into sustainable fuel for transportation

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.