Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SILENTCONNECT Malware Threatens Windows Security

SILENTCONNECT Malware Threatens Windows Security

Posted on March 20, 2026 By CWS

SILENTCONNECT, a sophisticated multi-stage malware, has been quietly infiltrating Windows systems since March 2025. It employs a combination of VBScript, in-memory PowerShell, and PEB masquerading to deploy the ConnectWise ScreenConnect tool, posing significant security risks to organizations globally.

How SILENTCONNECT Operates

The malware’s initial entry point is a phishing email, which lures victims with links that appear legitimate. Once the link is clicked, users are redirected to a Cloudflare Turnstile CAPTCHA, which, upon completion, triggers the download of a VBScript file, often disguised with credible names like Proposal-03-2026.vbs.

Researchers from Elastic Security Labs identified this campaign in March 2026. The infection process, characterized by living-off-the-land tactics, prompted numerous behavioral alerts. By tracing the VBScript’s origin URL, analysts discovered the script was hosted on Cloudflare’s r2.dev storage, while the C# payload was sourced from Google Drive, both platforms typically regarded as trustworthy.

Technical Details and Defense Evasion

SILENTCONNECT blends into routine Windows operations to evade detection. The VBScript disguises its true function by embedding malicious instructions within Replace and Chr functions, which decode to execute a PowerShell command. This command then uses curl.exe to download, compile, and execute a C# file in memory, bypassing traditional endpoint security checks.

The malware’s infrastructure showed a consistent pattern, with phishing emails traced back to a fake proposal from dan@checkfirst[.]net[.]au. The URI path download_invitee.php was reused across multiple sites, aiding researchers in mapping the campaign’s full scope.

Advanced Evasion Techniques

Once the .NET loader is executed, SILENTCONNECT vanishes from view by allocating memory through NtAllocateVirtualMemory and inserting a shellcode stub. This shellcode manipulates the Process Environment Block (PEB) to operate stealthily, avoiding monitored API calls.

By altering its module list entry to mimic a legitimate Windows utility, SILENTCONNECT becomes nearly invisible to EDR systems. Preceding ScreenConnect installation, it employs a UAC bypass, obfuscates parameters, and adds a Microsoft Defender exclusion for executables.

Organizations are advised to regularly audit their systems for unauthorized RMM tools and monitor unusual network traffic. Security teams should be vigilant about PowerShell commands, VBScript downloads, and unexpected Defender exclusions, as well as trace NtAllocateVirtualMemory calls in .NET applications.

Stay informed by following us on Google News, LinkedIn, and X. Set CSN as a preferred source on Google for the latest updates.

Cyber Security News Tags:Cybersecurity, Elastic Security Labs, Malware, PEB masquerading, Phishing, PowerShell, ScreenConnect, SILENTCONNECT, VBScript, Windows security

Post navigation

Previous Post: Global Crackdown on Aisuru and Kimwolf Botnets
Next Post: Langflow Vulnerability Exploited Rapidly After Disclosure

Related Posts

Hundreds of Thousands of Users Grok Chats Exposed in Google Search Results Hundreds of Thousands of Users Grok Chats Exposed in Google Search Results Cyber Security News
New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks Cyber Security News
Critical Apache NiFi Flaw Allows Access Control Bypass Critical Apache NiFi Flaw Allows Access Control Bypass Cyber Security News
Facebook, Netflix, Microsoft Hijacked to Insert Fake Phone Number Facebook, Netflix, Microsoft Hijacked to Insert Fake Phone Number Cyber Security News
Predator Mobile Spyware Remains Consistent with New Design Changes to Evade Detection Predator Mobile Spyware Remains Consistent with New Design Changes to Evade Detection Cyber Security News
Hackers Leverage Evilginx to Undermine MFA Security Mimicking Legitimate SSO Sites Hackers Leverage Evilginx to Undermine MFA Security Mimicking Legitimate SSO Sites Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Phantom Device Exploits Bypass Azure AD Security
  • Google Enhances Android Security with Binary Transparency
  • Daemon Tools Supply Chain Attack Targets Global Institutions
  • Critical Flaw in Palo Alto PAN-OS Allows Remote Code Execution
  • Ransomware Threats Rise in Aviation and Aerospace

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Phantom Device Exploits Bypass Azure AD Security
  • Google Enhances Android Security with Binary Transparency
  • Daemon Tools Supply Chain Attack Targets Global Institutions
  • Critical Flaw in Palo Alto PAN-OS Allows Remote Code Execution
  • Ransomware Threats Rise in Aviation and Aerospace

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark