Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

[contact-form-7 id="dd1f6aa" title="Newsletter"]
What's Hot

Murky Panda hackers exploit cloud trust to hack downstream customers

August 24, 2025

A new model predicts how molecules will dissolve in different solvents | MIT News

August 24, 2025

Metal Gear Solid Delta: Snake Eater Review – A true classic sheds its skin with a bold new look

August 24, 2025
Facebook X (Twitter) Instagram
Facebook Mastodon Bluesky Reddit
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
Home»Cyber Security»Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
Cyber Security

Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks

MichaBy MichaMay 19, 2025No Comments5 Mins Read
Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks


Introduction

Cybersecurity experts have uncovered a sophisticated malware campaign utilizing PowerShell to deploy the notorious Remcos RAT (Remote Access Trojan). This article dives into the details of the attack’s tactics, techniques, and procedures while offering crucial insights for enhancing your cybersecurity defenses against evolving threats. Read on to learn how these methods operate and what steps you can take to protect your systems.

Understanding the Remcos RAT Attack

Recently, researchers from Qualys revealed a new malware campaign that leverages malicious LNK files embedded in ZIP archives, often disguised to resemble legitimate Office documents. According to Akshay Thorve, a security researcher at Qualys, “The attack chain utilizes mshta.exe for proxy execution during its initial phase.

How the Attack Unfolds

The latest wave of attacks employs tax-related lures to entice unsuspecting users into opening the malicious ZIP package. The ZIP archive typically contains a Windows shortcut (LNK) file that activates mshta.exe, a legitimate Microsoft tool for running HTML Applications (HTAs).

This process executes an obfuscated HTML file named “xlab22.hta,” which is hosted on a remote server. This HTA file contains Visual Basic script code designed to download a PowerShell script, a decoy PDF, and another HTA file, “311.hta.” Notably, “311.hta” is configured to modify the Windows Registry, ensuring it launches automatically at system startup.

The Role of PowerShell in Malware Deployment

Once executed, the PowerShell script decodes and constructs a shellcode loader that, ultimately, launches the Remcos RAT payload entirely in memory. This tactic allows threat actors to operate stealthily, evading many traditional security solutions.

The Remcos RAT is infamous for granting attackers complete control over compromised systems. This versatile malware is equipped with numerous functions including keystroke logging, screenshot capture, clipboard monitoring, and retrieving lists of installed programs and currently running processes.

Furthermore, the malware establishes a TLS connection with a command-and-control (C2) server at “readysteaurants[.]com,” allowing for continuous data exfiltration and remote control. This level of functionality makes Remcos RAT a preferred choice for cyber espionage and data theft activities.

Challenges in Detection and Prevention

One of the most compelling aspects of this attack vector is its capability to evade traditional security measures. J. Stephen Kowski, Field CTO at SlashNext, highlighted, “The rise of PowerShell-based attacks like the Remcos RAT variant showcases how threat actors are evolving to outpace conventional defenses.” He emphasized the importance of advanced email security systems that can detect and block malicious LNK files before they reach users, along with real-time scanning of PowerShell commands for suspicious activities.

Emerging Threats and Tactics

Recent findings from Palo Alto Networks Unit 42 and Threatray have unveiled a new .NET loader that activates a variety of information stealers, including more variations of Remcos RAT. This loader operates in three stages, embedding the subsequent stages in encrypted forms within a .NET executable.

Moreover, other phishing and social engineering strategies have recently emerged, including:

  • KeeLoader: A trojanized version of the KeePass password manager that drops a Cobalt Strike beacon while compromising sensitive KeePass database data.
  • ClickFix Lures: Utilization of links embedded in PDF documents to seed Lumma Stealer.
  • Office Document Exploits: Deploying Formbook information stealer through booby-trapped Microsoft Office files.
  • Blob URIs: Locally loading credential phishing pages through phishing emails.
  • RAR Archives: Disguised as setup files to distribute NetSupport RAT, specifically targeting Ukraine and Poland.

The Role of AI in Modern Cyber Attacks

The rise of artificial intelligence has introduced new dimensions to cyber threats, enabling attackers to automate malware development and craft sophisticated phishing strategies. AI-powered campaigns, employing real-time polymorphic techniques, can mutate email subject lines, sender names, and message bodies to elude detection systems.

Cofense elaborated, “AI grants cybercriminals the ability to scale their attacks while personalizing phishing messages with surgical precision.” This evolution of threats highlights the shortcomings of perimeter-only defenses and underscores the importance of post-delivery detection methods.

Conclusion

The unfolding landscape of cybersecurity threats necessitates a proactive approach to defense. Enterprises must implement comprehensive security measures that encompass email filtering, advanced threat detection technologies, and continuous cybersecurity training for employees. By staying informed and vigilant, businesses can significantly reduce their risk of falling victim to the sophisticated techniques rendered by modern cyber adversaries like Remcos RAT.

FAQ

Question 1: What is Remcos RAT and how does it function?

Remcos RAT is a remote access trojan that enables attackers to gain complete control over compromised systems, allowing activities like keystroke logging and screen capturing.

Question 2: How can organizations protect themselves against PowerShell-based attacks?

Organizations can enhance protection by implementing advanced email security measures, real-time scanning of PowerShell commands, and conducting employee training to identify phishing scams.

Question 3: What role does AI play in modern cyber threats?

AI empowers attackers to automate and scale their operations, enabling them to generate personalized, polymorphic phishing messages that can bypass traditional security defenses.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



Read the original article

0 Like this
attacks Delivered Fileless files LNK MSHTA PowerShellBased RAT Remcos
Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
Previous ArticleSelf-Hosting LLMs with Docker and Proxmox: How to Run Your Own GPT
Next Article Paris kidnap bid highlights crypto data security risks

Related Posts

Cyber Security

Murky Panda hackers exploit cloud trust to hack downstream customers

August 24, 2025
Cyber Security

AI-powered financial scams swamp social media

August 22, 2025
Cyber Security

Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware

August 22, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Andy’s Tech

April 19, 20259 Views
Stay In Touch
  • Facebook
  • Mastodon
  • Bluesky
  • Reddit

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

About Us

Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

Most Popular

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Subscribe to Updates

Facebook Mastodon Bluesky Reddit
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 ioupdate. All Right Reserved.

Type above and press Enter to search. Press Esc to cancel.