Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Caminho Loader-as-a-Service Using Steganography to Conceal .NET Payloads within Image Files

Caminho Loader-as-a-Service Using Steganography to Conceal .NET Payloads within Image Files

Posted on January 27, 2026January 27, 2026 By CWS

Caminho Loader is a brand new Loader-as-a-Service risk that blends steganography, fileless execution, and cloud abuse to quietly ship malware throughout a number of areas.

First seen in March 2025 and believed to originate from Brazil, this service hides .NET payloads inside harmless-looking picture recordsdata hosted on trusted platforms.

As soon as triggered, it may possibly deploy a variety of distant entry trojans and infostealers, together with REMCOS RAT, XWorm, Katz Stealer, and AsyncRAT, to compromise contaminated techniques.

The operation focuses on organizations in South America, Africa, and Japanese Europe, with confirmed victims in Brazil, South Africa, Ukraine, and Poland.

Attackers depend on convincing phishing emails that use enterprise themes equivalent to invoices, quotations, and transport notices to lure customers into opening connected archive recordsdata.

Inside these RAR or ZIP archives, obfuscated JavaScript or VBScript recordsdata act because the preliminary execution level, silently beginning the multi-stage an infection chain when launched by the sufferer.

ANY.RUN analysts recognized Caminho Loader whereas analyzing suspicious submissions of their interactive sandbox, the place they noticed constant use of steganography, in-memory execution, and a versatile supply mannequin.

Their analysis reveals that every one analyzed samples share Portuguese strings and the distinctive “HackForums.gigajew” namespace, reinforcing the Brazilian connection.

The impression of this loader is critical as a result of it doesn’t rely on a single malware household. As a substitute, felony prospects hire the supply infrastructure and plug in their very own .NET payloads through standardized parameters.

This modular method permits a number of campaigns to share the identical steganographic photos and scripts whereas delivering utterly totally different trojans to finish targets.

For defenders, meaning one loader infrastructure can help credential theft, espionage, or distant entry, relying on who’s behind a given marketing campaign.

How Caminho Loader’s Steganographic An infection Chain Works

The an infection chain behind Caminho Loader makes use of legit companies at nearly each step, making it exhausting to filter with out harming regular enterprise site visitors.

Caminho Loader malware evaluation (Supply – Any.Run)

After a sufferer runs the malicious JavaScript or VBScript from a phishing archive, the script contacts Pastebin-like companies equivalent to paste.ee or pastefy.app to obtain closely obfuscated PowerShell code.

This PowerShell stage then reaches out to high-reputation platforms like archive.org to retrieve picture recordsdata that seem benign to each customers and safety instruments.

Inside these photos, Caminho hides Base64-encoded .NET loader code utilizing Least Important Bit (LSB) steganography, a technique that embeds information into the least seen components of pixel values with out altering how the image seems to be.

The PowerShell script scans the downloaded picture, extracts the hidden information, reconstructs the .NET meeting immediately in reminiscence, and invokes it with arguments that embrace the ultimate payload URL.

As a result of the loader by no means writes the executable to disk, conventional file-based antivirus instruments usually fail to spot the malicious part in any respect.

As soon as working in reminiscence, the Caminho Loader connects to attacker-controlled infrastructure to obtain and execute the chosen payload, equivalent to REMCOS or AsyncRAT, which then handles lateral motion, credential theft, and long-term entry.

AsyncRAT Injection traces one noticed case the place the loader injected AsyncRAT into the AddInProcess32 course of, mixing into regular system exercise.

ANY.RUN’s sandbox views of those phases give defenders a uncommon, end-to-end window right into a risk that in any other case goals to go away minimal forensic traces.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:.NET, Caminho, Conceal, Files, Image, LoaderasaService, Payloads, Steganography

Post navigation

Previous Post: China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023
Next Post: WD Discovery Desktop App for Windows Vulnerability Enables Arbitrary Code Execution

Related Posts

251 Malicious IPs Attacking Cloud-Based Devices Leveraging 75 Exposure Points 251 Malicious IPs Attacking Cloud-Based Devices Leveraging 75 Exposure Points Cyber Security News
Insider Threats in 2025 Detection and Prevention Strategies Insider Threats in 2025 Detection and Prevention Strategies Cyber Security News
Threat Actors Using Fake Notepad++ and 7-zip Websites to Deploy Remote Monitoring Tools Threat Actors Using Fake Notepad++ and 7-zip Websites to Deploy Remote Monitoring Tools Cyber Security News
New Quishing Attack With Weaponized QR Code Targeting Microsoft Users New Quishing Attack With Weaponized QR Code Targeting Microsoft Users Cyber Security News
Weaponized LNK File Disguised as Credit Card Security Email Steals User Data Weaponized LNK File Disguised as Credit Card Security Email Steals User Data Cyber Security News
New Android Spyware Disguised as an Antivirus Attacking Business Executives New Android Spyware Disguised as an Antivirus Attacking Business Executives Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News