Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
PureRAT Malware Utilizes PNG Files for Stealthy Attacks

PureRAT Malware Utilizes PNG Files for Stealthy Attacks

Posted on April 21, 2026 By CWS

A sophisticated cyber threat has emerged, employing the PureRAT remote access trojan (RAT) to infiltrate Windows systems with a novel method. This malware campaign stands out due to its use of PNG image files to discreetly embed malicious code.

Fileless Execution and Steganography

This campaign’s distinguishing feature is its fileless execution, where the malware operates entirely in memory, avoiding detection by traditional security measures. Steganography is employed to conceal malicious payloads within seemingly innocuous PNG images, making the threat challenging to identify.

The attack initiates with a malicious .lnk file, a trusted Windows shortcut format. When opened, it executes a hidden PowerShell command that retrieves a PNG file from a remote server. This image contains a Base64-encoded executable, cleverly masked to appear harmless.

Multi-Stage Infection Process

Researchers from Trellix have analyzed this campaign, highlighting its complex infection chain and layered obfuscation. The initial PowerShell command is heavily obfuscated to mislead security analysts and automated systems. The malware checks for virtual environments like VMware to avoid detection during sandbox analysis.

Once active, PureRAT gathers system information, bypasses user account control (UAC) using cmstp.exe, and uses process hollowing to execute malicious code under the guise of a legitimate Windows process, msbuild.exe. This allows it to maintain a low profile while connecting to a command-and-control server for further instructions.

Preventative Measures and Recommendations

Organizations are advised to strengthen their endpoint security by implementing strict execution policies for PowerShell and VBS scripts. Monitoring the use of Windows binaries such as cmstp.exe and msbuild.exe is crucial, as these are exploited in the attack chain.

Blocking known command-and-control domains and IP addresses, as well as regularly updating security patches, can help mitigate the risk of such attacks. User training is also essential to prevent the opening of suspicious .lnk files or email attachments, even those appearing to be from trusted sources.

As cyber threats like PureRAT evolve, it is crucial for organizations to remain vigilant and proactive in their cybersecurity measures to protect sensitive information and maintain system integrity.

Cyber Security News Tags:C2 Server, cyber threat, Cybersecurity, endpoint security, fileless attack, in-memory execution, Malware, network security, Obfuscation, PowerShell, process hollowing, PureRAT, Steganography, Trellix, Windows security

Post navigation

Previous Post: SystemBC Server Uncovers 1,570 Victims in Ransomware Operation
Next Post: Over 6000 Apache ActiveMQ Servers Risk CVE-2026-34197 Exploit

Related Posts

CISA Warns of Microsoft SharePoint server 0-Day RCE Vulnerability Exploited in Wild CISA Warns of Microsoft SharePoint server 0-Day RCE Vulnerability Exploited in Wild Cyber Security News
Anthropic Ends Third-Party Tool Access for Claude Anthropic Ends Third-Party Tool Access for Claude Cyber Security News
APT36 Attacking BOSS Linux Systems With Weaponized ZIP Files to Steal Sensitive Data APT36 Attacking BOSS Linux Systems With Weaponized ZIP Files to Steal Sensitive Data Cyber Security News
Lazarus Group’s IT Workers Scheme Hacker Group Caught Live On Camera Lazarus Group’s IT Workers Scheme Hacker Group Caught Live On Camera Cyber Security News
GitHub Outage Disrupts Core Services Globally for Users GitHub Outage Disrupts Core Services Globally for Users Cyber Security News
AI Browsers Present New Security Risks with Prompt Injection AI Browsers Present New Security Risks with Prompt Injection Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Over 6000 Apache ActiveMQ Servers Risk CVE-2026-34197 Exploit
  • PureRAT Malware Utilizes PNG Files for Stealthy Attacks
  • SystemBC Server Uncovers 1,570 Victims in Ransomware Operation
  • AI-Enhanced NGate Malware Targets NFC Payment Apps
  • AI Identity Visibility Lacking in Enterprises, Study Finds

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Over 6000 Apache ActiveMQ Servers Risk CVE-2026-34197 Exploit
  • PureRAT Malware Utilizes PNG Files for Stealthy Attacks
  • SystemBC Server Uncovers 1,570 Victims in Ransomware Operation
  • AI-Enhanced NGate Malware Targets NFC Payment Apps
  • AI Identity Visibility Lacking in Enterprises, Study Finds

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark