Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks

Source: The Hacker News
Published: 2025-05-16 07:56
Fetched: 2025-05-16 09:25

Summary

Cybersecurity researchers have uncovered a new malware campaign utilizing a PowerShell-based shellcode loader to deploy the Remcos RAT, a notorious remote access trojan. The attack involves malicious LNK files embedded in ZIP archives, often disguised as Office documents, to trick users into execution. The campaign leverages mshta.exe to initiate the attack chain, highlighting the evolving tactics of threat actors to bypass traditional security measures. This fileless attack method poses significant challenges for detection, emphasizing the need for advanced behavioral analysis and endpoint protection solutions. Organizations are urged to enhance their security protocols to mitigate such sophisticated threats.

LinkedIn Post

New fileless malware campaign exploits PowerShell to deploy Remcos RAT via LNK files. Disguised as Office docs, it evades detection using mshta.exe. Stay vigilant & enhance security measures! #Cybersecurity #Malware #RemcosRAT #PowerShell #ThreatDetection

Content

Cybersecurity researchers have shed light on a new malware campaign that makes use of a PowerShell-based shellcode loader to deploy a remote access trojan called Remcos RAT. "Threat actors delivered malicious LNK files embedded within ZIP archives, often disguised as Office documents," Qualys security researcher Akshay Thorve said in a technical report. "The attack chain leverages mshta.exe for