Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Use .PIF Files and UAC Bypass to Drop Remcos Malware on Windows

Posted on June 30, 2025June 30, 2025 By CWS

A complicated new phishing marketing campaign has emerged, leveraging out of date Home windows file codecs and superior evasion methods to distribute the infamous Remcos Distant Entry Trojan.

The assault chain employs DBatLoader as its main supply mechanism, using a mixture of Consumer Account Management bypass strategies, obfuscated scripts, and Dwelling Off the Land Binaries abuse to ascertain persistent entry to compromised programs.

The marketing campaign begins with fastidiously crafted phishing emails containing malicious archives that home an executable named “FAKTURA,” designed to deploy DBatLoader onto goal programs.

This multi-stage assault represents a regarding evolution in malware distribution methods, as menace actors more and more exploit professional Home windows functionalities and outdated file codecs to evade fashionable safety options.

Any.Run analysts recognized this marketing campaign by means of complete sandbox evaluation, revealing the intricate strategies employed by the malware to take care of stealth and persistence.

The researchers famous that the assault leverages Program Info Information (.pif), initially designed for configuring DOS-based applications in early Home windows programs, as a disguise mechanism for malicious executables.

Trailing areas permit attackers to abuse Home windows’s folder identify dealing with (Supply – Any.Run)

The implications of this marketing campaign lengthen past particular person infections, because the methods demonstrated may very well be tailored and weaponized by different menace actors.

The subtle mixture of UAC bypass, course of injection, and scheduled job abuse creates a sturdy an infection framework that challenges conventional detection methodologies and requires superior behavioral evaluation for identification.

An infection Mechanism and UAC Bypass Strategies

The core innovation of this marketing campaign lies in its exploitation of .pif recordsdata and Home windows folder identify dealing with vulnerabilities.

The malicious alpha.pif file, functioning as a Moveable Executable, circumvents Consumer Account Management by creating misleading directories comparable to “C:Home windows ” with trailing areas.

ANY.RUN flags PING.EXE exercise and identifies it as a delay simulation (Supply – Any.Run)

This system exploits Home windows’s folder identify parsing mechanisms, permitting the malware to realize elevated privileges with out triggering customary UAC prompts.

The assault employs refined time-based evasion by means of PING.EXE abuse, executing the command to ping the native loopback handle (127.0.0.1) ten instances.

Whereas professional purposes use this for community connectivity testing, DBatLoader repurposes this performance to introduce synthetic delays, serving to evade time-sensitive detection programs.

For persistence, the malware establishes a scheduled job that triggers a Cmwdnsyn.url file, which subsequently launches the .pif dropper.

The marketing campaign additional employs BatCloak obfuscation for .cmd recordsdata and makes use of extrac32.exe to control Home windows Defender exclusion lists.

As soon as deployed, Remcos injects itself into trusted system processes together with SndVol.exe and colorcpl.exe, various its goal processes throughout situations to mix seamlessly with professional system operations.

Examine stay malware habits, hint each step of an assault, and make sooner, smarter safety choices -> Attempt ANY.RUN now

Cyber Security News Tags:.PIF, Bypass, Drop, Files, Hackers, Malware, Remcos, UAC, Windows

Post navigation

Previous Post: NASA Needs Agency-Wide Cybersecurity Risk Assessment: GAO
Next Post: 2100+ Citrix Servers Vulnerable to Actively Exploited Bypass Authentication Vulnerability

Related Posts

Dutch Intelligence Exposes Russian “Laundry Bear” Cyber Group Behind Police Hack Cyber Security News
CISOs Playbook for Managing Boardroom Cybersecurity Concerns Cyber Security News
Bitter Malware Using Custom-Developed Tools To Evade Detection In Sophisticated Attacks Cyber Security News
New FrigidStealer Malware Attacking macOS Users to Steal Login Credentials Cyber Security News
Anatsa Android Banking Malware from Google Play Targeting Users in the U.S. and Canada Cyber Security News
New Veeam Themed Phishing Attack Using Weaponized Wav File to Attack users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Stay Anonymous Online
  • DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft
  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Stay Anonymous Online
  • DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft
  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News