Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Help CISOs to speak business language

Perseverance Rover reveals traces of life on Mars

Durham scientists advance reactors in superconductor research

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Asyncrat exploits ConnectWise ScreenConnect to steal credentials and ciphers
Identity

Asyncrat exploits ConnectWise ScreenConnect to steal credentials and ciphers

userBy userSeptember 11, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 11, 2025Ravi LakshmananMalware/Certifications

Cybersecurity researchers reveal details of a new campaign that leverages ConnectWise ScreenConnect, a legitimate remote monitoring and management (RMM) software, delivering a meatless loader that drops remote access Trojan (RAT), called Asyncrat, to steal sensitive data from reduced hosts.

“The attacker used ScreenConnect to gain remote access and ran a layered VBScript and PowerShell loader that retrieves and runs obfuscated components from external URLs,” LevelBlue said in a report shared with Hacker News. “These components are encoded .NET assemblies that are eventually deactivated to Asyncrat, while maintaining persistence via fake ‘Skype Updater’ scheduled tasks. ”

The infection chain documented by cybersecurity companies has shown that threat actors leverage the deployment of Screen Connect to launch remote sessions and start visual basic script payloads via keyboard activity.

“We’ve seen a Trojan screenconnect installer disguised as financial and other business documents sent via phishing emails,” Leadblue MDR SOC analyst Sean Shirley told Hacker News.

CIS Build Kit

The script is designed to use PowerShell scripts to retrieve two external payloads (“logs.ldk” and “logs.ldr”) from the attacker control server. The first of the two files is a DLL that is used to establish persistence using scheduled tasks by writing a secondary visual basic script on disk and by avoiding detection as “Skype Updater” and establishing saves using disks.

This visual basic script contains the same PowerShell logic observed at the start of the attack. Scheduled tasks ensure that the payload will run automatically every time you log in.

In addition to loading “logs.ldk” as a .NET assembly, the PowerShell script is passed as input to the load assembly, leading to the execution of the binary (“asyncclient.exe”). Browser extensions for Google Chrome, Brave, Microsoft Edge, Opera, and Mozilla Firefox.

All this collected information will eventually be extended to the Command and Control (C2) server (“3osch20.duckdns”[.]org”) via TCP socket, a malware beacon uses a beacon to perform a payload and receive commands after explosion. C2 connection settings are hardcoded or extracted from the remote path pebin URL.

“Fireless malware continues to pose major challenges to modern cybersecurity defenses due to its stealthiness and reliance on legitimate system tools for execution,” LevelBlue said. “Unlike traditional malware that writes payloads to disk, indelible threats work in memory, making them difficult to detect, analyze and eradicate.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePhoton water and repair: Full-spectrum PFAS treatment
Next Article Durham scientists advance reactors in superconductor research
user
  • Website

Related Posts

Help CISOs to speak business language

September 11, 2025

Chinese apt deploys egg stream fireless malware to infringe Philippine military systems

September 10, 2025

Chillyhell Macos backdoor and Zinorrat rats threaten Macos, Windows and Linux Systems

September 10, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Help CISOs to speak business language

Perseverance Rover reveals traces of life on Mars

Durham scientists advance reactors in superconductor research

Asyncrat exploits ConnectWise ScreenConnect to steal credentials and ciphers

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Bridging Healthcare Divides: ‘Break The Gap 2025’ Summit Sets New Agenda for Vertical Health

Wearable Tech Deep Dive: The Science Behind Smartwatches and Your Health Goals

The Adaptable Healthcare Playbook: How TwinH Is Leading the Way

Smart Health, Seamless Integration: GooApps Leads the Way in 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.