Fileless Execution : PowerShell Based Shellcode Loader Executes Remcos RAT : https://t.co/eNGMQVKits https://t.co/Y8My8Tm3N2
The Russian #ransomware groups BianLian and RansomEXX were tied to exploitations of @SAP's NetWeaver bug. China-based threat groups are also involved in the attack chain. #cybersecurity #infosec #ITsecurity https://t.co/uVu90PETIF
Ransomware gangs increasingly use Skitnet post-exploitation malware https://t.co/HrwxxVjnfF
A new cyberattack campaign has been identified that uses a fileless Remote Access Trojan (RAT) called Remcos, which operates entirely in memory to evade traditional security defenses. The malware is delivered through tax-themed ZIP files containing LNK shortcut files and leverages PowerShell and MSHTA to execute without writing files to disk. This technique allows attackers to gain full remote access to compromised systems. The campaign is linked to a known Russian cybercrime group and poses a threat to organizations in Western countries. Additionally, recent malicious activities include the use of .NET assemblies embedding bitmap resources to conceal RATs, as reported by cybersecurity researchers. Ransomware groups such as BianLian and RansomEXX, associated with Russian threat actors, have exploited vulnerabilities in SAP's NetWeaver software, with China-based groups also implicated in the attack chain. There is also a noted increase in ransomware gangs using Skitnet post-exploitation malware. Cybercriminals have further evolved tactics by embedding malware, spyware, and credential stealers directly into image files, complicating detection efforts.