Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Stealthy DEAD#VAX Malware Uses AsyncRAT via IPFS VHDs

Stealthy DEAD#VAX Malware Uses AsyncRAT via IPFS VHDs

Posted on February 4, 2026 By CWS

In a recent revelation, cybersecurity experts have uncovered a sophisticated malware operation, tagged as DEAD#VAX, which employs a combination of advanced techniques and legitimate system features to circumvent standard detection systems. This campaign orchestrates the deployment of AsyncRAT, a remote access trojan, using IPFS-hosted Virtual Hard Disk (VHD) files, as detailed by researchers Akshay Gaikwad, Shikha Sangwan, and Aaron Beardslee from Securonix.

Innovative Techniques in Malware Deployment

The DEAD#VAX campaign distinguishes itself by utilizing a decentralized network, InterPlanetary Filesystem (IPFS), to distribute VHD files disguised as innocuous PDF documents. These files, once opened by unsuspecting targets, mount as virtual hard drives, initiating the malware’s infection sequence. The use of VHDs in this context exemplifies a modern evasion strategy that bypasses traditional security measures.

Central to this operation is AsyncRAT, an open-source malware that provides malicious actors with significant control over compromised systems. It facilitates espionage activities such as keylogging, screen and webcam capture, and clipboard monitoring, while also allowing file system access and execution of remote commands.

Complex Multi-Stage Execution Pipeline

The deployment of AsyncRAT is achieved through a multi-layered process involving highly obfuscated scripts and self-parsing PowerShell loaders. These components work together to deliver an encrypted shellcode directly into trusted Windows processes, maintaining a fileless execution that leaves minimal forensic evidence.

Upon mounting the VHD, an embedded Windows Script File (WSF) is executed, which triggers a series of checks to ensure the environment is not virtualized or sandboxed. It then runs a PowerShell-based injector designed to embed the payload into Microsoft-signed processes, enhancing the malware’s ability to blend into legitimate system operations.

Stealth and Persistence in Malware Operations

The stealth of the DEAD#VAX campaign is further enhanced by controlling execution timing and using sleep intervals to minimize CPU usage and avoid suspicious activity. This strategic execution reduces anomalies in runtime behavior, making detection by traditional security solutions challenging.

By opting for a fileless execution model, the malware avoids creating recognizable binaries on disk, thereby complicating detection and forensic analysis. This approach represents a growing trend among modern attackers who favor trusted file formats and script manipulation to evade security defenses.

The DEAD#VAX operation underscores a significant shift in cyber threats, where attackers deploy multi-stage pipelines that appear innocuous individually, complicating detection and response efforts. As these methods evolve, cybersecurity defenses must adapt to address the increasing sophistication of such threats.

The Hacker News Tags:AsyncRAT, Cybersecurity, endpoint security, fileless malware, IPFS, Malware, Obfuscation, Phishing, PowerShell, VHD files

Post navigation

Previous Post: PhantomVAI Loader Utilizes RunPE for Stealthy Attacks
Next Post: Interlock Ransomware Utilizes Zero-Day to Evade Security

Related Posts

Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks The Hacker News
Why More Security Leaders Are Selecting AEV Why More Security Leaders Are Selecting AEV The Hacker News
New PathWiper Data Wiper Malware Disrupts Ukrainian Critical Infrastructure in 2025 Attack New PathWiper Data Wiper Malware Disrupts Ukrainian Critical Infrastructure in 2025 Attack The Hacker News
Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials The Hacker News
Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors The Hacker News
Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybercriminals Exploit Cloud Services for Phishing
  • Addressing SOC False Negatives with Interactive Analysis
  • Interlock Ransomware Utilizes Zero-Day to Evade Security
  • Stealthy DEAD#VAX Malware Uses AsyncRAT via IPFS VHDs
  • PhantomVAI Loader Utilizes RunPE for Stealthy Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybercriminals Exploit Cloud Services for Phishing
  • Addressing SOC False Negatives with Interactive Analysis
  • Interlock Ransomware Utilizes Zero-Day to Evade Security
  • Stealthy DEAD#VAX Malware Uses AsyncRAT via IPFS VHDs
  • PhantomVAI Loader Utilizes RunPE for Stealthy Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark