Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Caminho Loader-as-a-Service Using Steganography to Conceal .NET Payloads within Image Files

Caminho Loader-as-a-Service Using Steganography to Conceal .NET Payloads within Image Files

Posted on January 27, 2026January 27, 2026 By CWS

Caminho Loader is a brand new Loader-as-a-Service risk that blends steganography, fileless execution, and cloud abuse to quietly ship malware throughout a number of areas.

First seen in March 2025 and believed to originate from Brazil, this service hides .NET payloads inside harmless-looking picture recordsdata hosted on trusted platforms.

As soon as triggered, it may possibly deploy a variety of distant entry trojans and infostealers, together with REMCOS RAT, XWorm, Katz Stealer, and AsyncRAT, to compromise contaminated techniques.

The operation focuses on organizations in South America, Africa, and Japanese Europe, with confirmed victims in Brazil, South Africa, Ukraine, and Poland.

Attackers depend on convincing phishing emails that use enterprise themes equivalent to invoices, quotations, and transport notices to lure customers into opening connected archive recordsdata.

Inside these RAR or ZIP archives, obfuscated JavaScript or VBScript recordsdata act because the preliminary execution level, silently beginning the multi-stage an infection chain when launched by the sufferer.

ANY.RUN analysts recognized Caminho Loader whereas analyzing suspicious submissions of their interactive sandbox, the place they noticed constant use of steganography, in-memory execution, and a versatile supply mannequin.

Their analysis reveals that every one analyzed samples share Portuguese strings and the distinctive “HackForums.gigajew” namespace, reinforcing the Brazilian connection.

The impression of this loader is critical as a result of it doesn’t rely on a single malware household. As a substitute, felony prospects hire the supply infrastructure and plug in their very own .NET payloads through standardized parameters.

This modular method permits a number of campaigns to share the identical steganographic photos and scripts whereas delivering utterly totally different trojans to finish targets.

For defenders, meaning one loader infrastructure can help credential theft, espionage, or distant entry, relying on who’s behind a given marketing campaign.

How Caminho Loader’s Steganographic An infection Chain Works

The an infection chain behind Caminho Loader makes use of legit companies at nearly each step, making it exhausting to filter with out harming regular enterprise site visitors.

Caminho Loader malware evaluation (Supply – Any.Run)

After a sufferer runs the malicious JavaScript or VBScript from a phishing archive, the script contacts Pastebin-like companies equivalent to paste.ee or pastefy.app to obtain closely obfuscated PowerShell code.

This PowerShell stage then reaches out to high-reputation platforms like archive.org to retrieve picture recordsdata that seem benign to each customers and safety instruments.

Inside these photos, Caminho hides Base64-encoded .NET loader code utilizing Least Important Bit (LSB) steganography, a technique that embeds information into the least seen components of pixel values with out altering how the image seems to be.

The PowerShell script scans the downloaded picture, extracts the hidden information, reconstructs the .NET meeting immediately in reminiscence, and invokes it with arguments that embrace the ultimate payload URL.

As a result of the loader by no means writes the executable to disk, conventional file-based antivirus instruments usually fail to spot the malicious part in any respect.

As soon as working in reminiscence, the Caminho Loader connects to attacker-controlled infrastructure to obtain and execute the chosen payload, equivalent to REMCOS or AsyncRAT, which then handles lateral motion, credential theft, and long-term entry.

AsyncRAT Injection traces one noticed case the place the loader injected AsyncRAT into the AddInProcess32 course of, mixing into regular system exercise.

ANY.RUN’s sandbox views of those phases give defenders a uncommon, end-to-end window right into a risk that in any other case goals to go away minimal forensic traces.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:.NET, Caminho, Conceal, Files, Image, LoaderasaService, Payloads, Steganography

Post navigation

Previous Post: China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023
Next Post: WD Discovery Desktop App for Windows Vulnerability Enables Arbitrary Code Execution

Related Posts

Pakistani Actors Built 300+ Cracking Websites Used to Deliver Info-Stealer Malware Pakistani Actors Built 300+ Cracking Websites Used to Deliver Info-Stealer Malware Cyber Security News
New FireWood Malware Attacking Linux Systems to Execute Commands and Exfiltrate Sensitive Data New FireWood Malware Attacking Linux Systems to Execute Commands and Exfiltrate Sensitive Data Cyber Security News
5 Common Back-to-School Online Scams Powered Using AI and How to Avoid Them 5 Common Back-to-School Online Scams Powered Using AI and How to Avoid Them Cyber Security News
Russian Fake-News Network CopyCop Added 200+ New Websites to Targets US, Canada and France Russian Fake-News Network CopyCop Added 200+ New Websites to Targets US, Canada and France Cyber Security News
Security Researchers Expose Lazarus Recruitment Pipeline Live on Camera Through Honeypot Operation Security Researchers Expose Lazarus Recruitment Pipeline Live on Camera Through Honeypot Operation Cyber Security News
Ransomware 2.0 How AI-Powered Attacks Are Evolving Ransomware 2.0 How AI-Powered Attacks Are Evolving Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark