Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SILENTCONNECT Malware Threatens Windows Security

SILENTCONNECT Malware Threatens Windows Security

Posted on March 20, 2026 By CWS

SILENTCONNECT, a sophisticated multi-stage malware, has been quietly infiltrating Windows systems since March 2025. It employs a combination of VBScript, in-memory PowerShell, and PEB masquerading to deploy the ConnectWise ScreenConnect tool, posing significant security risks to organizations globally.

How SILENTCONNECT Operates

The malware’s initial entry point is a phishing email, which lures victims with links that appear legitimate. Once the link is clicked, users are redirected to a Cloudflare Turnstile CAPTCHA, which, upon completion, triggers the download of a VBScript file, often disguised with credible names like Proposal-03-2026.vbs.

Researchers from Elastic Security Labs identified this campaign in March 2026. The infection process, characterized by living-off-the-land tactics, prompted numerous behavioral alerts. By tracing the VBScript’s origin URL, analysts discovered the script was hosted on Cloudflare’s r2.dev storage, while the C# payload was sourced from Google Drive, both platforms typically regarded as trustworthy.

Technical Details and Defense Evasion

SILENTCONNECT blends into routine Windows operations to evade detection. The VBScript disguises its true function by embedding malicious instructions within Replace and Chr functions, which decode to execute a PowerShell command. This command then uses curl.exe to download, compile, and execute a C# file in memory, bypassing traditional endpoint security checks.

The malware’s infrastructure showed a consistent pattern, with phishing emails traced back to a fake proposal from dan@checkfirst[.]net[.]au. The URI path download_invitee.php was reused across multiple sites, aiding researchers in mapping the campaign’s full scope.

Advanced Evasion Techniques

Once the .NET loader is executed, SILENTCONNECT vanishes from view by allocating memory through NtAllocateVirtualMemory and inserting a shellcode stub. This shellcode manipulates the Process Environment Block (PEB) to operate stealthily, avoiding monitored API calls.

By altering its module list entry to mimic a legitimate Windows utility, SILENTCONNECT becomes nearly invisible to EDR systems. Preceding ScreenConnect installation, it employs a UAC bypass, obfuscates parameters, and adds a Microsoft Defender exclusion for executables.

Organizations are advised to regularly audit their systems for unauthorized RMM tools and monitor unusual network traffic. Security teams should be vigilant about PowerShell commands, VBScript downloads, and unexpected Defender exclusions, as well as trace NtAllocateVirtualMemory calls in .NET applications.

Stay informed by following us on Google News, LinkedIn, and X. Set CSN as a preferred source on Google for the latest updates.

Cyber Security News Tags:Cybersecurity, Elastic Security Labs, Malware, PEB masquerading, Phishing, PowerShell, ScreenConnect, SILENTCONNECT, VBScript, Windows security

Post navigation

Previous Post: Global Crackdown on Aisuru and Kimwolf Botnets
Next Post: Langflow Vulnerability Exploited Rapidly After Disclosure

Related Posts

10 Best Bot Protection Software 10 Best Bot Protection Software Cyber Security News
ShadowSyndicate Adopts Server Transition in Cyber Attacks ShadowSyndicate Adopts Server Transition in Cyber Attacks Cyber Security News
Arizona Attorney General Suses Chinese E-commerce Retailer Temu Over Data Theft Claims Arizona Attorney General Suses Chinese E-commerce Retailer Temu Over Data Theft Claims Cyber Security News
Malicious Chrome Extensions Compromise VKontakte Users Malicious Chrome Extensions Compromise VKontakte Users Cyber Security News
Microsoft Teams to Auto-Set Work Location by Detecting the Wi-Fi Network Microsoft Teams to Auto-Set Work Location by Detecting the Wi-Fi Network Cyber Security News
Decoding PIN-Protected BitLocker Through TPM SPI Analysis To Decrypt And Mount The Disks Decoding PIN-Protected BitLocker Through TPM SPI Analysis To Decrypt And Mount The Disks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Massive Defacement Hits Over 7,500 Magento Sites
  • Behavioral Analytics Crucial in AI Cybersecurity Threats
  • Critical Bamboo Server Flaw Allows Remote Code Execution
  • Allure Security Secures $17M for Brand Protection
  • AI-Powered Apex Enhances App Security by Finding Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Massive Defacement Hits Over 7,500 Magento Sites
  • Behavioral Analytics Crucial in AI Cybersecurity Threats
  • Critical Bamboo Server Flaw Allows Remote Code Execution
  • Allure Security Secures $17M for Brand Protection
  • AI-Powered Apex Enhances App Security by Finding Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark