Malware & RansomwareHIGH

Malware - Open Directory Campaign Uses Obfuscated VBS Files

CSCyber Security News
VBSRATPowerShellRemcosXWorm
🎯

Basically, a new malware uses tricky scripts and images to sneak into computers and take control.

Quick Summary

A new malware campaign is using obfuscated VBS files and PNG loaders to deploy RATs. Organizations are at risk as this sophisticated attack reveals a complex multi-stage operation. Immediate protective measures are crucial to safeguard systems from these threats.

What Happened

A sophisticated malware campaign has emerged, utilizing obfuscated Visual Basic Script (VBS) files and PNG-embedded loaders to deploy Remote Access Trojans (RATs). This multi-stage attack was first detected in early 2026 during routine endpoint monitoring. What initially appeared to be a simple alert quickly unfolded into a well-organized operation, revealing a delivery framework capable of pushing various malware payloads from a single infrastructure.

The campaign began with a suspicious VBS file named Name_File.vbs, found in the \Users\Public\Downloads\ directory of a compromised system. SentinelOne's endpoint protection caught and quarantined the file, but the encoded content warranted further investigation. Analysts from LevelBlue discovered that this alert was just the tip of the iceberg, leading to the identification of multiple obfuscated VBS files linked to different malware payloads, including XWorm variants and Remcos RAT.

Who's Being Targeted

This malware campaign targets organizations that may not have stringent security measures in place. The attackers leveraged an infrastructure hosted on an attacker-controlled domain, news4me[.]xyz, which featured openly accessible directories. These directories served various roles, including staging VBS launchers and hosting obfuscated payload files. The campaign's design allows for rapid updates and expansions of hosted payloads, making it a flexible and scalable threat.

The attackers' choice of using obfuscated scripts and PNG files allows them to bypass many traditional security measures. As organizations continue to rely on endpoint detection systems, the sophisticated nature of this campaign poses a significant risk to their security posture.

Signs of Infection

The infection mechanism begins with the VBS file, which acts as a launcher without containing active malicious code. Instead, it executes a Base64-encoded PowerShell command that fetches a PNG file from a remote server. This PNG file, seemingly innocuous, contains hidden malware that loads directly into memory, allowing the attackers to maintain a low profile.

Once executed, the malware downloads additional payloads, including an instance of Remcos RAT and a DLL designed to bypass User Account Control (UAC). This approach enables attackers to gain persistent access to compromised machines while leaving minimal traces on disk, complicating detection efforts for security teams.

How to Protect Yourself

Organizations should take immediate action to mitigate the risks posed by this malware campaign. Restricting the execution of VBS and BAT files from user-writable directories is crucial. Additionally, enforcing constrained PowerShell policies and enabling in-memory execution logging can help detect such threats early.

At the network level, blocking WebDAV connections and filtering out .xyz domains can limit access to the attacker's infrastructure. It's essential for organizations to not only rely on endpoint protection but also engage in deeper threat intelligence investigations to uncover broader attack vectors. Stopping one alert is not enough when the underlying infrastructure remains active and ready to deploy new attacks.

🔒 Pro insight: The use of in-memory execution techniques in this campaign highlights the need for enhanced detection capabilities against fileless malware.

Original article from

Cyber Security News · Tushar Subhra Dutta

Read Full Article

Related Pings

HIGHMalware & Ransomware

Ransomware - US Healthcare Provider Hit by Iranian Gang

A U.S. healthcare provider has been targeted by the Iranian ransomware gang Pay2Key. This attack underscores the growing risk to critical infrastructure. Organizations must enhance their cybersecurity measures to combat such threats.

SC Media·
HIGHMalware & Ransomware

Malware - Trojanized ConnectWise ScreenConnect Attack Uncovered

A new tax-themed malvertising campaign is spreading trojanized ConnectWise ScreenConnect installers. Unsuspecting users searching for tax documents are at risk. Stay vigilant and protect your devices from these sophisticated attacks.

SC Media·
HIGHMalware & Ransomware

Malware - Illicit npm Packages Spread Covert Infections

Illicit npm packages are using fake install logs to spread malware. Developers are at risk of losing sensitive data and cryptocurrency. Stay vigilant and verify package sources!

SC Media·
HIGHMalware & Ransomware

Malware - Student Arrested in ClayRat Spyware Scheme

A student has been arrested for running the ClayRat spyware operation targeting Android users. This malware's rapid growth and collapse reveal significant security flaws. Stay informed to protect your devices from similar threats.

SC Media·
HIGHMalware & Ransomware

Torg Grabber - New Infostealer Targets 728 Crypto Wallets

Torg Grabber malware is stealing sensitive data from over 700 crypto wallets. This poses significant risks to users' financial security. Stay informed and protect your assets.

BleepingComputer·
HIGHMalware & Ransomware

VoidLink - Analyzing a Sophisticated Linux Rootkit Framework

Elastic Security Labs has analyzed VoidLink, a complex Linux rootkit framework. This malware uses advanced techniques to evade detection and maintain persistence. Organizations using Linux systems should be aware of the risks and take action to protect their environments.

Elastic Security Labs·