Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Stealthy Malware Campaign Utilizes VBS and Remote Trojans

Stealthy Malware Campaign Utilizes VBS and Remote Trojans

Posted on March 25, 2026 By CWS

A complex malware campaign has emerged, leveraging obfuscated Visual Basic Script (VBS) files, PNG-based loaders, and remote access trojans (RATs) to infiltrate systems while avoiding disk detection.

Initially appearing as a routine endpoint alert in early 2026, the attack unveiled a sophisticated structure capable of deploying various malware payloads through distinct attack sequences, all managed from a unified infrastructure.

Detection and Initial Findings

The campaign’s first indication was a dubious VBS file, Name_File.vbs, located in the UsersPublicDownloads directory of an infected system. SentinelOne’s endpoint protection intercepted and isolated the file before execution, yet the encoded contents warranted further analysis.

Upon decoding, a Base64-encoded PowerShell command was uncovered, featuring external network links—clear evidence that the file’s purpose was to retrieve additional elements remotely.

LevelBlue analysts discovered this single event was part of a broader operation. Their SpiderLabs Cyber Threat Intelligence team found an attacker-controlled domain hosting multiple obfuscated VBS files, each linked to different malware payloads, including XWorm variants and Remcos RAT.

Infrastructure and Attack Vectors

The attackers utilized the domain news4me[.]xyz with open directories like /coupon/, /protector/, and /invoice/, each serving specific roles such as staging VBS launchers or hosting obfuscated payload files.

This intentional open-directory setup allowed quick updates and rotations of hosted payloads without altering core delivery logic, creating a flexible and scalable system resilient to partial detection.

Investigations revealed a separate infection chain linked to a fake PDF, further confirming the campaign’s multi-vector approach.

Inside the Infection Mechanism

The infection process begins with a VBS file acting as a launcher, devoid of active malicious code. Stripping away Unicode obfuscation reveals a Base64-encoded PowerShell command, which functions as a fileless loader.

This command enforces TLS 1.2, using the Net.WebClient class to download a PNG image—MSI_PRO_with_b64.png. Although seemingly ordinary, it contains hidden data between custom markers, known as PhantomVAI, which loads directly into memory, bypassing most security controls.

Once executed, PhantomVAI accesses two URLs for further actions. The first, news4me[.]xyz/protector/johnremcos.txt, decodes into a Remcos RAT instance, granting persistent remote access. The second delivers a uac.png file with a UAC Bypass DLL, designed for silent privilege escalation.

Response and Prevention Measures

Organizations should restrict the execution of .vbs and .bat files from user-writable directories like UsersPublic and enforce constrained PowerShell policies with in-memory execution logging. At the network level, blocking WebDAV-based connections and filtering .xyz domains can limit access to attacker infrastructure.

Pairing endpoint protection with comprehensive threat intelligence investigations is crucial, as addressing a single alert is insufficient when the overarching infrastructure remains active and adaptable.

Stay updated with the latest cybersecurity news by following us on Google News, LinkedIn, and X. Set CSN as your preferred source for timely updates.

Cyber Security News Tags:cyber threat, Cybersecurity, endpoint protection, fileless malware, in-memory execution, IT security, Malware, network protection, open directory, PowerShell, Remcos RAT, remote trojans, threat intelligence, VBS

Post navigation

Previous Post: China-Linked Cyberattack Targets Southeast Asian Military
Next Post: Mirai Botnets Escalate Global Cyber Threats

Related Posts

Chrome 143 Released With Fix for 13 Vulnerabilities that Enables Arbitrary Code Execution Chrome 143 Released With Fix for 13 Vulnerabilities that Enables Arbitrary Code Execution Cyber Security News
WordPress Admins Beware! Fake Cache Plugin that Steals Admin Logins WordPress Admins Beware! Fake Cache Plugin that Steals Admin Logins Cyber Security News
NIST Adopts Risk-Based Approach Amid Rising CVE Submissions NIST Adopts Risk-Based Approach Amid Rising CVE Submissions Cyber Security News
Critical VMware Vulnerability Exposes IT Systems to Risks Critical VMware Vulnerability Exposes IT Systems to Risks Cyber Security News
Hackers Exploit nslookup.exe for DNS Payload Delivery Hackers Exploit nslookup.exe for DNS Payload Delivery Cyber Security News
Urgent Patch Needed for Citrix NetScaler Vulnerabilities Urgent Patch Needed for Citrix NetScaler Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Urgent: cPanel and WHM Security Updates Released
  • TCLBANKER Trojan Expands Through WhatsApp and Outlook
  • Critical Microsoft 365 Copilot Flaws Resolved by Microsoft
  • NVIDIA Data Breach Exposes GeForce Users’ Personal Info
  • Let’s Encrypt Temporarily Stops Certificate Issuance After Issue

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Urgent: cPanel and WHM Security Updates Released
  • TCLBANKER Trojan Expands Through WhatsApp and Outlook
  • Critical Microsoft 365 Copilot Flaws Resolved by Microsoft
  • NVIDIA Data Breach Exposes GeForce Users’ Personal Info
  • Let’s Encrypt Temporarily Stops Certificate Issuance After Issue

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark