Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Pulsar RAT Using Memory-Only Execution & HVNC to Gain Invisible Remote Access

Posted on January 20, 2026January 20, 2026 By CWS

Pulsar RAT has emerged as a complicated spinoff of the open-source Quasar RAT, introducing harmful enhancements that allow attackers to keep up invisible distant entry via superior evasion methods.

This modular Home windows-focused distant administration software represents a major evolution in risk sophistication.

Combining memory-only execution with hidden digital community computing (HVNC) capabilities that circumvent conventional detection strategies.

Technical Structure and Capabilities

Pulsar operates utilizing a client-server mannequin, with TLS-encrypted communication and the MessagePack binary protocol for environment friendly command transmission.

The malware establishes persistence by way of UAC bypass mechanisms and by creating scheduled duties at system logon with elevated privileges.

What distinguishes Pulsar from predecessors is its complete characteristic set:

FeatureDescriptionKeyloggingRecords keystrokes to seize delicate person enter.Clipboard HijackingReplaces cryptocurrency pockets addresses within the clipboard.Credential TheftSteals credentials utilizing the built-in Kematian Grabber module.File ManagementAllows attackers to browse, add, and obtain information.Distant ShellEnables execution of instructions on contaminated techniques.Information ExfiltrationCollects and sends stolen knowledge to attacker-controlled servers.

The malware retrieves its command-and-control configuration from public pastebin websites. It decrypts payloads utilizing embedded cryptographic keys to acquire C2 server addresses.

This method provides operational flexibility whereas decreasing direct infrastructure publicity. Pulsar’s sophistication lies in its multi-layered anti-analysis arsenal.

Pulsar RAT assault chain in ANY.RUN’s Sandbox (supply: any.run )

The malware consists of anti-virtualization checks that examine disk labels for indicators of digital machines, together with “QEMU HARDDISK” and customary hypervisor signatures.

Upon detection, execution halts instantly, stopping sandbox evaluation. Anti-debugging protections additional hinder safety software examination. Reminiscence-only execution represents Pulsar’s most consequential innovation.

The malware masses payloads instantly into reminiscence by way of .NET reflection with out writing information to disk, making a fileless assault vector that bypasses disk-based safety monitoring.

This method eliminates forensic artifacts and dramatically reduces incident response visibility.

Code injection capabilities allow execution inside professional processes, rendering detection based mostly on course of names ineffective.

Distribution and Assault Chains

Current samples show distribution via provide chain compromises.

A notable 2025 npm bundle marketing campaign used malicious libraries “troopers” and “@mediawave/lib” using seven-layer obfuscation, together with Unicode variable encoding, hexadecimal conversion, Base64 encoding, and steganography embedded in PNG pictures.

Submit-install scripts robotically delivered payloads to builders, reaching a whole lot of weekly downloads earlier than detection.

ANY.RUN sandbox evaluation reveals typical deployment sequences: malicious BAT information execute UAC bypass operations by clearing DelegateExecute registry values and injecting instructions into ms-settings registry keys.

BAT file created firstly of the assault (supply: any.run )

The mechanism launches computerdefaults.exe with elevated privileges, subsequently creating scheduled duties configured for persistence at each person logon.

Pulsar primarily targets Window/s customers and organizations that lack superior endpoint detection and response (EDR) options, with a selected give attention to builders via supply-chain mechanisms.

Current detections concerned multi-RAT deployments dropping Pulsar alongside Quasar, NjRAT, and XWorm variants via open directories, suggesting each opportunistic and focused an infection campaigns.

Pulsar course of succession (supply: any.run )

Evaluation tags from latest samples embody evasion, crypto-regex patterns, donut loaders, rust-based parts, and Python implementations, indicating evolving assault frameworks and steady growth.

The malware’s modular design permits seamless plugin additions for personalisation based mostly on particular marketing campaign targets and goal environments.

Organizations face substantial operational impression from Pulsar infections, with remediation requiring 200-500 person-hours and lengthening past technical compromise to mental property theft and regulatory violations.

The malware’s refined anti-analysis methods and fileless execution strategies demand layered protection controls combining EDR platforms, community segmentation, and person safety consciousness coaching.

Pulsar detected by YARA rule (supply: any.run )

Detection requires built-in risk intelligence combining indicator searches, sandbox evaluation, and community infrastructure correlation.

Safety groups investigating Pulsar ought to question risk intelligence platforms utilizing indicators, together with vacation spot IP addresses, C2 infrastructure, and behavioral signatures related to memory-only execution and HVNC operations.

Pulsar RAT’s mixture of stealth capabilities, complete performance, and provide chain assault vectors positions it as an rising vital risk requiring fast organizational consideration and defensive prioritization.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Access, Execution, Gain, HVNC, Invisible, MemoryOnly, Pulsar, RAT, Remote

Post navigation

Previous Post: ChatGPT Go Launched for $8 USD/month With Support for Ads
Next Post: Tudou Guarantee Marketplace Halts Telegram Transactions After Processing Over $12 Billion

Related Posts

Threat Actors Advertising ‘MioLab MacOS’ Infostealer on an Underground Forum Cyber Security News
Wireshark Vulnerabilities Let Attackers Crash by Injecting a Malformed Packet Cyber Security News
Researchers Created a Linux Rootkit that Evades Elastic Security EDR Detection Cyber Security News
CISA Warns of Apple macOS, iOS, tvOS, Safari, and watchOS Vulnerability Exploited in Attacks Cyber Security News
Malicious Chrome Extension Steals Wallet Login Credentials and Enables Automated Trading Cyber Security News
Amazon WorkSpaces For Linux Vulnerability Let Attackers extract valid authentication token Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Weaponized Invite Enabled Calendar Data Theft via Google Gemini
  • Attackers Abuse Discord to Deliver Clipboard Hijacker That Steals Wallet Addresses on Paste
  • Python-based Malware SolyxImmortal Leverages Discord to Silently Harvest Sensitive Data
  • Critical AVEVA Software Vulnerabilities Enables Remote Code Execution Under System Privileges
  • Tudou Guarantee Marketplace Halts Telegram Transactions After Processing Over $12 Billion

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Weaponized Invite Enabled Calendar Data Theft via Google Gemini
  • Attackers Abuse Discord to Deliver Clipboard Hijacker That Steals Wallet Addresses on Paste
  • Python-based Malware SolyxImmortal Leverages Discord to Silently Harvest Sensitive Data
  • Critical AVEVA Software Vulnerabilities Enables Remote Code Execution Under System Privileges
  • Tudou Guarantee Marketplace Halts Telegram Transactions After Processing Over $12 Billion

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark