More recent threat campaigns have illustrated the utilization of BAT-based loaders to distribute sophisticated Remote Access Trojans (RATs) including XWorm and Remcos. The attacks usually commence with a ZIP package—often hosted on sites like ImgKit—that carries heavily obfuscated BAT scripts. Upon execution, the script kicks off a PowerShell-based loader that injects the RAT payload straight into memory, evading file-based detection mechanisms. Two main delivery mechanisms have been noticed: malevolent EML email attachments and SVG-file embedded URLs. Interestingly, SVG files are increasingly being used with embedded JavaScript to silently trigger ZIP downloads, moving the threat model to formats that are not generally thought of as dangerous. In these campaigns, threat actors make use of sophisticated evasion techniques such as multi-layer obfuscation, PowerShell in-memory execution, and AMSI/ETW patching to bypass detection. PowerShell loader makes use of Base64-obfuscated code for updating Windows defenses and decrypting .NET assemblies or shellcode for in-memory RAT execution. Persistence is created by dropping instances of the BAT script in the Startup folder for ensuring payload execution at reboot or login. The ultimate objective remains the same: avoid detection, establish remote control, exfiltrate information, and have long-term access through potent RAT capabilities such as keylogging, remote command execution, and file handling. In order to counter these emerging threats, organizations need to implement sophisticated behavioral detection technology that can detect suspicious PowerShell activity and in-memory injections. Content inspection mechanisms need to be applied to all file types, including SVGs, to identify embedded scripts. User awareness training needs to be supplemented to enable staff to identify phishing emails and suspicious attachments. Finally, endpoint protection platforms need to enhance memory scanning and logging anomaly detection to match progressively stealthier malware methods.
Security researchers have uncovered a sophisticated phishing campaign targeting TRON wallet users through a malicious Chrome extension impersonating the popular TronLink wallet. Th...
Online shoppers are facing a renewed threat as cybercriminals linked to the Magecart ecosystem have begun abusing Google Tag Manager (GTM) containers to distribute malicious credit...
A serious security flaw has been discovered in the Cline kanban package that could allow attackers to perform remote code execution, steal sensitive data, and stop active AI sessio...