Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Stealthy DEAD#VAX Malware Uses AsyncRAT via IPFS VHDs

Stealthy DEAD#VAX Malware Uses AsyncRAT via IPFS VHDs

Posted on February 4, 2026 By CWS

In a recent revelation, cybersecurity experts have uncovered a sophisticated malware operation, tagged as DEAD#VAX, which employs a combination of advanced techniques and legitimate system features to circumvent standard detection systems. This campaign orchestrates the deployment of AsyncRAT, a remote access trojan, using IPFS-hosted Virtual Hard Disk (VHD) files, as detailed by researchers Akshay Gaikwad, Shikha Sangwan, and Aaron Beardslee from Securonix.

Innovative Techniques in Malware Deployment

The DEAD#VAX campaign distinguishes itself by utilizing a decentralized network, InterPlanetary Filesystem (IPFS), to distribute VHD files disguised as innocuous PDF documents. These files, once opened by unsuspecting targets, mount as virtual hard drives, initiating the malware’s infection sequence. The use of VHDs in this context exemplifies a modern evasion strategy that bypasses traditional security measures.

Central to this operation is AsyncRAT, an open-source malware that provides malicious actors with significant control over compromised systems. It facilitates espionage activities such as keylogging, screen and webcam capture, and clipboard monitoring, while also allowing file system access and execution of remote commands.

Complex Multi-Stage Execution Pipeline

The deployment of AsyncRAT is achieved through a multi-layered process involving highly obfuscated scripts and self-parsing PowerShell loaders. These components work together to deliver an encrypted shellcode directly into trusted Windows processes, maintaining a fileless execution that leaves minimal forensic evidence.

Upon mounting the VHD, an embedded Windows Script File (WSF) is executed, which triggers a series of checks to ensure the environment is not virtualized or sandboxed. It then runs a PowerShell-based injector designed to embed the payload into Microsoft-signed processes, enhancing the malware’s ability to blend into legitimate system operations.

Stealth and Persistence in Malware Operations

The stealth of the DEAD#VAX campaign is further enhanced by controlling execution timing and using sleep intervals to minimize CPU usage and avoid suspicious activity. This strategic execution reduces anomalies in runtime behavior, making detection by traditional security solutions challenging.

By opting for a fileless execution model, the malware avoids creating recognizable binaries on disk, thereby complicating detection and forensic analysis. This approach represents a growing trend among modern attackers who favor trusted file formats and script manipulation to evade security defenses.

The DEAD#VAX operation underscores a significant shift in cyber threats, where attackers deploy multi-stage pipelines that appear innocuous individually, complicating detection and response efforts. As these methods evolve, cybersecurity defenses must adapt to address the increasing sophistication of such threats.

The Hacker News Tags:AsyncRAT, Cybersecurity, endpoint security, fileless malware, IPFS, Malware, Obfuscation, Phishing, PowerShell, VHD files

Post navigation

Previous Post: PhantomVAI Loader Utilizes RunPE for Stealthy Attacks
Next Post: Interlock Ransomware Utilizes Zero-Day to Evade Security

Related Posts

Beware the Hidden Costs of Pen Testing Beware the Hidden Costs of Pen Testing The Hacker News
Gold Melody IAB Exploits Exposed ASP.NET Machine Keys for Unauthorized Access to Targets Gold Melody IAB Exploits Exposed ASP.NET Machine Keys for Unauthorized Access to Targets The Hacker News
Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions The Hacker News
U.S. Treasury Lifts Sanctions on Three Individuals Linked to Intellexa and Predator Spyware U.S. Treasury Lifts Sanctions on Three Individuals Linked to Intellexa and Predator Spyware The Hacker News
Malicious PyPI Package Impersonates SymPy, Deploys XMRig Miner on Linux Hosts Malicious PyPI Package Impersonates SymPy, Deploys XMRig Miner on Linux Hosts The Hacker News
Open Source Web Application Firewall with Zero-Day Detection and Bot Protection Open Source Web Application Firewall with Zero-Day Detection and Bot Protection The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News