Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks

Cybersecurity researchers have shed light on a new malware campaign that makes use of a PowerShell-based shellcode loader to deploy a remote access trojan called Remcos RAT.
“Threat actors delivered malicious LNK files embedded within ZIP archives, often disguised as Office documents,” Qualys security researcher Akshay Thorve said in a technical report. “The attack chain leverages mshta.exe for

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

[Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications

Next Post

Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks

Related Posts
Total
0
Share