Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell
Global Security

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

AdminBy AdminMay 16, 2025No Comments5 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Cybersecurity researchers spilled light on a new malicious program that uses the Sherlcode loader based on PowerShell to deploy Trajo with remote access called Remcos Rat.

“The actors threatened the malicious LNK files built into the ZIP archives, often dressed in office documents” – Note In a technical report. “The attack chain uses mshta.exe to perform proxy initially. “

The latest wave of attacks, like detailed Qualys, uses baits related to taxes to attract users to the opening of the malicious archive of ZIP, which contains the Windows (LNK) file (LNK), which, in turn, uses mshta.exe, a legitimate Microsoft tool used to launch the HTML (HTA) applications.

The binary is used to execute the embarrassed HTA file called “Xlab22.hta”, located on a remote server, which includes a visual basic script code for downloading the PowerShell, PDF -Dr. and other HTA file, similar to Xlab22.hta called “311.hta”. The HTA file is also customized to make a Windows registry modifications to make sure that “311.hta” is automatically starting when running the system.

Once the PowerShell scenario is executed, it decodes and restores the Shellcode loader, which ultimately continues to start the useful Remcos rats fully in memory.

Remcos Rat is a well-known malicious software that offers a threat to complete control over the impaired systems, making it an ideal tool for cyber spying and data theft. 32-bit binary compiled using Visual Studio C ++ 8, it has a modular structure and can assemble system metadata, magazine keys, screenshot shooting, clipboard data monitoring and getting a list of all installed programs and launch processes.

Cybersecurity

In addition, it installs the TLS connection with the team server and control (C2) on “Readysteaurants (.) Com supporting a sustainable channel for exports and data management.

This is not the first time in the wild were seen hopeless versions of Remcos rats. In November 2024, the Fortinet Fortinet Lab minute The phishing company that ruthlessly deployed malicious software using lures with theme.

What makes the attack method attractive to the threatening actors is that it allows them to work unnoticed by many traditional security decisions, since the malicious code works directly into the computer memory, leaving very few traces on the disk.

“The growth of attacks based on PowerShell as a new version of Remcos Rat, demonstrates how the threats are developing to avoid traditional security measures,” J. said. Stephen Kowski, Figure Technical Director in Slashnext.

“This ruthless malicious software works directly in memory, using LNK and Mshta.exe files to perform embarrassed PowerShell scenarios that can bypass the usual protection. Expanded email safety that can detect and block malicious LNK investments before they reach users, as it is decided, as it is decided, as it is decided. for suspicious behavior. “

Disclosure of information happens as Palo Alto Networks Unit 42 and Intimidate Detailed new .Net loader used to fall wide range of stolen goods and rats such as Tesla, NovasteAler, Ramcos Rat, VipKeylogger, Xloader and Xworm.

The loader has three stages running in tandem to deploy the final stages of useful load: executed .Net, which built the second and third stage in encrypted form, Dll .Net, which transcripts and loads the next stage, and .Net Dll, which manages the deployment of basic software.

“While earlier versions have built the second stage in the form of a rigid line, the later versions use the resource of the crazy,” said Orpharray. “The first stage takes out and deciphering this data, and then performs them in memory to launch the second stage.”

The 42 block describes the use of clumps to hide the harmful useful loads of AA Technique, which can bypass traditional security mechanisms and evade detection.

The results also coincide with the advent of multiple phishing and social engineering companies that are designed for powers and delivery of malware –

  • Using Trojonized Password Management Software Keepass – Codenament Killer – To abandon Bobalt Strike Beacon and steal tangible Keepass database data, including administrative credentials. The malicious installers are located in the Typosquat Typosquat domains provided through Bing ADS.
  • Relate Clickfix bait and URL -URL, laid into PDF documents and a number of intermediaries —Pop URLs for deployment Theft of a lama.
  • Relate Microsoft Office documents backed up used for deployment Form of books Information theft, protected by the distribution service of malware mentioned as Defender Horus.
  • Relate BLOBRI To locally upload the phishing accounting page through the phishing-leaf, the Blob Uris is provided using the pages listed (eg, OneDrive.live (.) COM) that abuse the victims to the malicious area containing the HTML-controlling page.
  • Relate Archives of rar Masking as a setup file for distribution Netsupport Rat In attacks aimed at Ukraine and Poland.
  • Using Phisching Sheets for Distribution HTML attachments containing a malicious code for capturing victims, accounts and Gmail and highlighted them in a telegram called “Blessed Magazines”, which are active since February 2025
Cybersecurity

Developments were also supplemented by companies supported by artificial intelligence (AI) using polymorphic tricks that mutated in real time to reach the side. These include modification of the theme of the e -mail, the names of the sender and body content to slip past the detection based on signatures.

“AI gave the subjects threatening to automate malware, large -scale field attacks, and personalized phishing messages with surgical precision,” Cofense – Note.

“These developing threats are becoming more and more able to bypass traditional e -mail filters, emphasizing the abandonment of only the perimeter and the need to detect after delivery. It also allowed them to overcome traditional protection through polymorphic phishing that change the content to the fly. The result: deceptive messages that are more difficult to discover.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.