Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks

Posted on May 16, 2025May 16, 2025 By CWS

Cybersecurity researchers have make clear a brand new malware marketing campaign that makes use of a PowerShell-based shellcode loader to deploy a distant entry trojan known as Remcos RAT.
“Risk actors delivered malicious LNK recordsdata embedded inside ZIP archives, usually disguised as Workplace paperwork,” Qualys safety researcher Akshay Thorve mentioned in a technical report. “The assault chain leverages mshta.exe for proxy execution through the preliminary stage.”
The most recent wave of assaults, as detailed by Qualys, employs tax-related lures to entice customers into opening a malicious ZIP archive containing a Home windows shortcut (LNK) file, which, in flip, makes use of mshta.exe, a professional Microsoft device used to run HTML Purposes (HTA).
The binary is used to execute an obfuscated HTA file named “xlab22.hta” hosted on a distant server, which includes Visible Fundamental Script code to obtain a PowerShell script, a decoy PDF, and one other HTA file much like xlab22.hta known as “311.hta.” The HTA file can also be configured to make Home windows Registry modifications to make sure that “311.hta” is routinely launched upon system startup.
As soon as the PowerShell script is executed, it decodes and reconstructs a shellcode loader that in the end proceeds to launch the Remcos RAT payload solely in reminiscence.
Remcos RAT is a well known malware that gives menace actors full management over compromised techniques, making it a really perfect device for cyber espionage and knowledge theft. A 32-bit binary compiled utilizing Visible Studio C++ 8, it includes a modular construction and might collect system metadata, log keystrokes, seize screenshots, monitor clipboard knowledge, and retrieve a listing of all put in packages and operating processes.

As well as, it establishes a TLS connection to a command-and-control (C2) server at “readysteaurants[.]com,” sustaining a persistent channel for knowledge exfiltration and management.
This isn’t the primary time fileless variations of Remcos RAT have been noticed within the wild. In November 2024, Fortinet FortiGuard Labs detailed a phishing marketing campaign that filelessly deployed the malware by making use of order-themed lures.
What makes the assault methodology engaging to menace actors is that it permits them to function undetected by many conventional safety options because the malicious code runs straight within the laptop’s reminiscence, leaving only a few traces on the disk.

“The rise of PowerShell-based assaults like the brand new Remcos RAT variant demonstrates how menace actors are evolving to evade conventional safety measures,” J Stephen Kowski, Area CTO at SlashNext, mentioned.
“This fileless malware operates straight in reminiscence, utilizing LNK recordsdata and MSHTA.exe to execute obfuscated PowerShell scripts that may bypass standard defenses. Superior e mail safety that may detect and block malicious LNK attachments earlier than they attain customers is essential, as is real-time scanning of PowerShell instructions for suspicious behaviors.”

The disclosure comes as Palo Alto Networks Unit 42 and Threatray detailed a brand new .NET loader that is used to detonate a variety of commodity data stealers and RATS like Agent Tesla, NovaStealer, Remcos RAT, VIPKeylogger, XLoader, and XWorm.
The loader options three phases that work in tandem to deploy the final-stage payload: A .NET executable that embeds the second and third phases in encrypted kind, a .NET DLL that decrypts and masses the following stage, and a .NET DLL that manages the deployment of the principle malware.
“Whereas earlier variations embedded the second stage as a hardcoded string, newer variations use a bitmap useful resource,” Threatray mentioned. “The primary stage extracts and decrypts this knowledge, then executes it in reminiscence to launch the second stage.”
Unit 42 described the usage of bitmap assets to hide malicious payloads a a steganography approach that may bypass conventional safety mechanisms and evade detection.
The findings additionally coincide with the emergence of a number of phishing and social engineering campaigns which are engineered for credential theft and malware supply –

Use of trojanized variations of the KeePass password administration software program – codenamed KeeLoader – to drop a Cobalt Strike beacon and steal delicate KeePass database knowledge, together with administrative credentials. The malicious installers are hosted on KeePass typosquat domains which are served by way of Bing advertisements.
Use of ClickFix lures and URLs embedded inside PDF paperwork and a collection of middleman dropper URLs to deploy Lumma Stealer.
Use of booby-trapped Microsoft Workplace paperwork which are used to deploy the Formbook data stealer protected utilizing a malware distribution service known as Horus Protector.
Use of blob URIs to domestically masses a credential phishing web page by way of phishing emails, with the blob URIs served utilizing allow-listed pages (e.g., onedrive.reside[.]com) which are abused to redirect victims to a malicious website that accommodates a hyperlink to a menace actor-controlled HTML web page.
Use of RAR archives masquerading as setup recordsdata to distribute NetSupport RAT in assaults concentrating on Ukraine and Poland.
Use of phishing emails to distribute HTML attachments that comprise malicious code to seize victims’ Outlook, Hotmail, and Gmail credentials and exfiltrate them to a Telegram bot named “Blessed logs” that has been lively since February 2025

The developments have additionally been complemented by the rise in synthetic intelligence (AI)-powered campaigns that leverage polymorphic tips that mutate in real-time to sidestep detection efforts. These embody modifying e mail topic strains, sender names, and physique content material to slide previous signature-based detection.
“AI gave menace actors the ability to automate malware improvement, scale assaults throughout industries, and personalize phishing messages with surgical precision,” Cofense mentioned.
“These evolving threats are more and more capable of bypass conventional e mail filters, highlighting the failure of perimeter-only defenses and the necessity for post-delivery detection. It additionally enabled them to outmaneuver conventional defenses by way of polymorphic phishing campaigns that shift content material on the fly. The consequence: misleading messages which are more and more troublesome to detect and even tougher to cease.”

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Attacks, Delivered, Fileless, Files, LNK, MSHTA, PowerShellBased, RAT, Remcos

Post navigation

Previous Post: Learn a Smarter Way to Defend Modern Applications
Next Post: Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks

Related Posts

Horabot Malware Targets 6 Latin American Nations Using Invoice-Themed Phishing Emails The Hacker News
Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers The Hacker News
Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers The Hacker News
Germany Shuts Down eXch Over $1.9B Laundering, Seizes €34M in Crypto and 8TB of Data The Hacker News
BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan The Hacker News
Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer
  • Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access
  • UK Legal Aid Agency Finds Data Breach Following Cyberattack
  • 480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer
  • Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access
  • UK Legal Aid Agency Finds Data Breach Following Cyberattack
  • 480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News