Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Remcos RAT Masquerade as VeraCrypt Installers Steals Users Login Credentials

Remcos RAT Masquerade as VeraCrypt Installers Steals Users Login Credentials

Posted on January 19, 2026January 20, 2026 By CWS

A classy malware marketing campaign concentrating on South Korean customers has emerged, distributing the Remcos distant entry trojan (RAT) via misleading installers disguised as reliable VeraCrypt encryption software program.

This ongoing assault marketing campaign primarily focuses on people linked to unlawful on-line playing platforms, although safety consultants warn that on a regular basis customers downloading encryption instruments may fall sufferer to the scheme.

The risk actors behind this operation are utilizing two distinct distribution strategies to unfold the malicious payload.

The primary strategy entails faux database lookup applications that seem to verify blocklists for playing web site accounts, whereas the second masquerades as real VeraCrypt utility installers.

GUI display of the distributed Remcos RAT (Supply – ASEC)

Each distribution channels have been noticed delivering malware via internet browsers and messaging platforms like Telegram, utilizing filenames akin to “*****usercon.exe” and “blackusernon.exe” to deceive unsuspecting victims.

ASEC analysts recognized that when executed, the faux installers deploy malicious VBS scripts hidden inside their useful resource sections.

These scripts are written to the system’s short-term listing with randomized filenames earlier than being activated.

The malware then initiates a fancy an infection chain involving a number of levels of obfuscated VBS and PowerShell scripts, in the end delivering the Remcos RAT payload that offers attackers full distant management over compromised methods.

The impression of this marketing campaign extends past easy unauthorized entry.

Remcos RAT is supplied with in depth knowledge theft capabilities together with keylogging, screenshot seize, webcam and microphone management, and credential extraction from internet browsers.

Victims contaminated with this malware face vital dangers of getting their delicate private info, login credentials, and monetary knowledge compromised and transmitted to the attackers’ command-and-control servers.

Multi-Stage An infection Chain and Payload Supply

The assault employs a complicated eight-stage an infection course of designed to evade detection by safety software program.

After the preliminary dropper executes, the malware progresses via 5 scripted downloader levels utilizing obfuscated VBS and PowerShell scripts with deceptive file extensions.

These intermediate scripts comprise dummy feedback, junk knowledge, and recordsdata masquerading as JPG photos whereas really embedding Base64-encoded malicious payloads.

Malware contained in the obfuscated routine and dummy knowledge (Supply -ASEC)

The an infection chain culminates with a .NET-based injector that communicates with attackers by way of Discord webhooks.

This injector downloads the ultimate Remcos RAT payload from distant servers, decrypts it, and injects it immediately into the AddInProcess32.exe course of to keep up persistence.

Notably, safety researchers found that some variants use Korean-language strings of their configuration settings and registry keys, indicating the marketing campaign’s focused nature towards Korean-speaking customers.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Credentials, Installers, Login, Masquerade, RAT, Remcos, Steals, Users, VeraCrypt

Post navigation

Previous Post: Threat Actors Weaponizing Visual Studio Code to Deploy a Multistage Malware
Next Post: Google Gemini Privacy Controls Bypassed to Access Private Meeting Data Using Calendar Invite

Related Posts

Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available Cyber Security News
Weaponized LNK File Disguised as Credit Card Security Email Steals User Data Weaponized LNK File Disguised as Credit Card Security Email Steals User Data Cyber Security News
MongoDB Servers at Critical Risk MongoDB Servers at Critical Risk Cyber Security News
New Sneaky 2FA Phishing Kit with BitB Technique Attacking Users to Steal Microsoft Account Credentials New Sneaky 2FA Phishing Kit with BitB Technique Attacking Users to Steal Microsoft Account Credentials Cyber Security News
Lumma Infostealer Steal All Data Stored in Browsers and Selling Them in Underground Markets as Logs Lumma Infostealer Steal All Data Stored in Browsers and Selling Them in Underground Markets as Logs Cyber Security News
Arizona Woman Sentenced for Helping North Korean IT Workers by Operating Laptop Farm Arizona Woman Sentenced for Helping North Korean IT Workers by Operating Laptop Farm Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News