Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Deepgram raises $130 million at $1.3 billion valuation and acquires YC AI startup

New advanced Linux VoidLink malware targets cloud and container environments

What should we learn from how attackers leverage AI in 2025?

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New malware campaign delivers Remcos RAT via multi-stage Windows attack
Identity

New malware campaign delivers Remcos RAT via multi-stage Windows attack

userBy userJanuary 13, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

January 13, 2026Ravi LakshmananMalware/Endpoint Security

Cybersecurity researchers have revealed details of a new campaign called “SHADOW#REACTOR.” The campaign utilizes an evasive multi-stage attack chain to distribute a commercially available remote administration tool called Remcos RAT to establish persistent and covert remote access.

“The infection chain follows a tightly tailored execution path: an obfuscated VBS launcher running via wscript.exe calls a PowerShell downloader to retrieve a fragmented text-based payload from a remote host,” Securonix researchers Akshay Gaikwad, Shikha Sangwan, and Aaron Beardslee said in a technical report shared with The Hacker News.

“These fragments are reassembled into encoded loaders, decoded in memory by .NET Reactor-protected assemblies, and used to fetch and apply remote Remcos configurations. The final stage leverages MSBuild.exe as a resident binary (LOLBin) to complete execution. The Remcos RAT backdoor is then fully deployed to take control of the compromised system.”

cyber security

This activity is characterized as widespread and opportunistic, and is primarily targeted at corporate and small business environments. This tool and trade craft works with typical early access brokers who gain a foothold in a target environment and sell it to other actors for financial gain. However, there is no evidence that it is from any known threat group.

The most unusual aspect of this campaign is its reliance on a text-only intermediate stager, combined with the use of a reflective loader secured with PowerShell and .NET Reactor for in-memory reconstruction, to deploy subsequent phases of the attack, with the aim of complicating detection and analysis efforts.

The infection sequence begins by retrieving and executing an obfuscated Visual Basic script (‘win64.vbs’). This script can be triggered by user interaction, such as clicking a link delivered via a socially engineered lure. This script is executed using ‘wscript.exe’ and acts as a lightweight launcher for Base64 encoded PowerShell payloads.

The PowerShell script then uses System.Net.WebClient to communicate with the same server used to fetch the VBS file and drop a text-based payload named “qpwoe64.txt” (or “qpwoe32.txt” on 32-bit systems) into the machine’s %TEMP% directory.

“The script then enters a loop that verifies the existence and size of the file,” Securonix explained. “If the file is not found or is below the configured length threshold (minLength), the stager pauses the execution and re-downloads the content. If the threshold is not met within the defined timeout window (maxWait), the execution continues without terminating, preventing chain failure.”

“This mechanism ensures that incomplete or corrupted payload fragments do not immediately interrupt execution, strengthening the campaign’s self-healing design.”

If the text file meets the relevant criteria, it will start building a second secondary PowerShell script (‘jdywa.ps1’) in the %TEMP% directory. This launches the .NET Reactor Loader, which is responsible for establishing persistence, retrieving the next stage of the malware, and incorporating various anti-debug and anti-VM checks to covertly.

cyber security

The loader eventually launches the Remcos RAT malware on the compromised host using the legitimate Microsoft Windows process ‘MSBuild.exe’. The attack also drops an execution wrapper script that uses ‘wscript.exe’ to retrigger the execution of ‘win64.vbs’.

“Taken together, these behaviors indicate the existence of an actively maintained, modular loader framework designed to keep Remcos payloads portable, resilient, and difficult to classify statically,” the researchers said. “The combination of text-only intermediate files, in-memory .NET Reactor loader, and LOLBin exploitation reflects a deliberate strategy to prevent rapid triage by antivirus signatures, sandboxing, and analysts.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleEU strengthens rules on PFAS in drinking water
Next Article Uncovering soil health through precision mapping
user
  • Website

Related Posts

New advanced Linux VoidLink malware targets cloud and container environments

January 13, 2026

What should we learn from how attackers leverage AI in 2025?

January 13, 2026

ServiceNow fixes critical AI platform flaw that allows unauthenticated user impersonation

January 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Deepgram raises $130 million at $1.3 billion valuation and acquires YC AI startup

New advanced Linux VoidLink malware targets cloud and container environments

What should we learn from how attackers leverage AI in 2025?

ServiceNow fixes critical AI platform flaw that allows unauthenticated user impersonation

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.