Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Use .PIF Files and UAC Bypass to Drop Remcos Malware on Windows

Hackers Use .PIF Files and UAC Bypass to Drop Remcos Malware on Windows

Posted on June 30, 2025June 30, 2025 By CWS

A complicated new phishing marketing campaign has emerged, leveraging out of date Home windows file codecs and superior evasion methods to distribute the infamous Remcos Distant Entry Trojan.

The assault chain employs DBatLoader as its main supply mechanism, using a mixture of Consumer Account Management bypass strategies, obfuscated scripts, and Dwelling Off the Land Binaries abuse to ascertain persistent entry to compromised programs.

The marketing campaign begins with fastidiously crafted phishing emails containing malicious archives that home an executable named “FAKTURA,” designed to deploy DBatLoader onto goal programs.

This multi-stage assault represents a regarding evolution in malware distribution methods, as menace actors more and more exploit professional Home windows functionalities and outdated file codecs to evade fashionable safety options.

Any.Run analysts recognized this marketing campaign by means of complete sandbox evaluation, revealing the intricate strategies employed by the malware to take care of stealth and persistence.

The researchers famous that the assault leverages Program Info Information (.pif), initially designed for configuring DOS-based applications in early Home windows programs, as a disguise mechanism for malicious executables.

Trailing areas permit attackers to abuse Home windows’s folder identify dealing with (Supply – Any.Run)

The implications of this marketing campaign lengthen past particular person infections, because the methods demonstrated may very well be tailored and weaponized by different menace actors.

The subtle mixture of UAC bypass, course of injection, and scheduled job abuse creates a sturdy an infection framework that challenges conventional detection methodologies and requires superior behavioral evaluation for identification.

An infection Mechanism and UAC Bypass Strategies

The core innovation of this marketing campaign lies in its exploitation of .pif recordsdata and Home windows folder identify dealing with vulnerabilities.

The malicious alpha.pif file, functioning as a Moveable Executable, circumvents Consumer Account Management by creating misleading directories comparable to “C:Home windows ” with trailing areas.

ANY.RUN flags PING.EXE exercise and identifies it as a delay simulation (Supply – Any.Run)

This system exploits Home windows’s folder identify parsing mechanisms, permitting the malware to realize elevated privileges with out triggering customary UAC prompts.

The assault employs refined time-based evasion by means of PING.EXE abuse, executing the command to ping the native loopback handle (127.0.0.1) ten instances.

Whereas professional purposes use this for community connectivity testing, DBatLoader repurposes this performance to introduce synthetic delays, serving to evade time-sensitive detection programs.

For persistence, the malware establishes a scheduled job that triggers a Cmwdnsyn.url file, which subsequently launches the .pif dropper.

The marketing campaign additional employs BatCloak obfuscation for .cmd recordsdata and makes use of extrac32.exe to control Home windows Defender exclusion lists.

As soon as deployed, Remcos injects itself into trusted system processes together with SndVol.exe and colorcpl.exe, various its goal processes throughout situations to mix seamlessly with professional system operations.

Examine stay malware habits, hint each step of an assault, and make sooner, smarter safety choices -> Attempt ANY.RUN now

Cyber Security News Tags:.PIF, Bypass, Drop, Files, Hackers, Malware, Remcos, UAC, Windows

Post navigation

Previous Post: NASA Needs Agency-Wide Cybersecurity Risk Assessment: GAO
Next Post: 2100+ Citrix Servers Vulnerable to Actively Exploited Bypass Authentication Vulnerability

Related Posts

New Report on Commercial Spyware Vendors Detailing Their Targets and Infection Chains New Report on Commercial Spyware Vendors Detailing Their Targets and Infection Chains Cyber Security News
Chinese Hackers Weaponized Nezha Tool to Execute Commands on Web Server Chinese Hackers Weaponized Nezha Tool to Execute Commands on Web Server Cyber Security News
Researchers Created a Linux Rootkit that Evades Elastic Security EDR Detection Researchers Created a Linux Rootkit that Evades Elastic Security EDR Detection Cyber Security News
iOS 26 Deletes Pegasus and Predator Spyware Infection Evidence by Overwriting The ‘shutdown.log’ file on Reboot iOS 26 Deletes Pegasus and Predator Spyware Infection Evidence by Overwriting The ‘shutdown.log’ file on Reboot Cyber Security News
Decoding Microsoft 365 Audit Log Events Using Bitfield Mapping Technique Decoding Microsoft 365 Audit Log Events Using Bitfield Mapping Technique Cyber Security News
Police Body Camera Apps Sending Data to Cloud Servers Hosted in China Via TLS Port 9091 Police Body Camera Apps Sending Data to Cloud Servers Hosted in China Via TLS Port 9091 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News