Malware & RansomwareHIGH

Malware - Open Directory Campaign Uses Obfuscated VBS Files

CSCyber Security News·Reporting by Tushar Subhra Dutta
Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Updated:
🎯

Basically, a new malware uses tricky scripts and images to sneak into computers and take control.

Quick Summary

A new malware campaign is using obfuscated VBS files and PNG loaders to deploy RATs. Organizations are at risk as this sophisticated attack reveals a complex multi-stage operation. Immediate protective measures are crucial to safeguard systems from these threats.

What Happened

A sophisticated malware campaign has emerged, utilizing obfuscated Visual Basic Script (VBS) files and PNG-embedded loaders to deploy Remote Access Trojans (RATs). This multi-stage attack was first detected in early 2026 during routine endpoint monitoring. What initially appeared to be a simple alert quickly unfolded into a well-organized operation, revealing a delivery framework capable of pushing various malware payloads from a single infrastructure.

The campaign began with a suspicious VBS file named Name_File.vbs, found in the \Users\Public\Downloads\ directory of a compromised system. SentinelOne's endpoint protection caught and quarantined the file, but the encoded content warranted further investigation. Analysts from LevelBlue discovered that this alert was just the tip of the iceberg, leading to the identification of multiple obfuscated VBS files linked to different malware payloads, including XWorm variants and Remcos RAT.

Who's Being Targeted

This malware campaign targets organizations that may not have stringent security measures in place. The attackers leveraged an infrastructure hosted on an attacker-controlled domain, news4me[.]xyz, which featured openly accessible directories. These directories served various roles, including staging VBS launchers and hosting obfuscated payload files. The campaign's design allows for rapid updates and expansions of hosted payloads, making it a flexible and scalable threat.

The attackers' choice of using obfuscated scripts and PNG files allows them to bypass many traditional security measures. As organizations continue to rely on endpoint detection systems, the sophisticated nature of this campaign poses a significant risk to their security posture.

Signs of Infection

The infection mechanism begins with the VBS file, which acts as a launcher without containing active malicious code. Instead, it executes a Base64-encoded PowerShell command that fetches a PNG file from a remote server. This PNG file, seemingly innocuous, contains hidden malware that loads directly into memory, allowing the attackers to maintain a low profile.

Once executed, the malware downloads additional payloads, including an instance of Remcos RAT and a DLL designed to bypass User Account Control (UAC). This approach enables attackers to gain persistent access to compromised machines while leaving minimal traces on disk, complicating detection efforts for security teams.

How to Protect Yourself

Organizations should take immediate action to mitigate the risks posed by this malware campaign. Restricting the execution of VBS and BAT files from user-writable directories is crucial. Additionally, enforcing constrained PowerShell policies and enabling in-memory execution logging can help detect such threats early.

At the network level, blocking WebDAV connections and filtering out .xyz domains can limit access to the attacker's infrastructure. It's essential for organizations to not only rely on endpoint protection but also engage in deeper threat intelligence investigations to uncover broader attack vectors. Stopping one alert is not enough when the underlying infrastructure remains active and ready to deploy new attacks.

🔒 Pro insight: The use of in-memory execution techniques in this campaign highlights the need for enhanced detection capabilities against fileless malware.

Original article from

CSCyber Security News· Tushar Subhra Dutta
Read Full Article

Also covered by

MIMicrosoft Security Blog

WhatsApp malware campaign delivers VBS payloads and MSI backdoors

Read Article

Related Pings

HIGHMalware & Ransomware

Malware Newsletter Round 91 - Latest Threats and Insights

The latest malware newsletter reveals new threats like Infiniti Stealer and npm supply chain attacks. Developers and organizations must stay alert to evolving risks in cybersecurity.

Security Affairs·
HIGHMalware & Ransomware

Malicious Email Delivers CMD Malware - Privilege Escalation Alert

A malicious email has delivered a .cmd malware file that escalates privileges and bypasses antivirus systems. Users are at risk of significant system compromise. Awareness and immediate action are vital to mitigate this threat.

Security Affairs·
HIGHMalware & Ransomware

Axios NPM Package Compromised - Supply Chain Attack Exposed

A major supply chain attack compromised the Axios NPM package, affecting millions of users. Malicious versions deployed a RAT, posing serious security risks. Swift action was taken to remove the threats.

Trend Micro Research·
HIGHMalware & Ransomware

Brokk Hacked - Play Ransomware Exposes Sensitive Data

Brokk has reportedly been hacked by Play ransomware, leading to the leak of sensitive corporate data. This incident could severely impact the company's reputation and security. Organizations must bolster their defenses to prevent similar breaches.

SC Media·
HIGHMalware & Ransomware

Chaos Malware - New Targeting of 64-bit Linux Servers

Chaos malware has evolved to target 64-bit Linux servers, expanding its attack surface. This shift raises alarms for organizations relying on these systems. Enhanced security measures are now crucial to protect against potential larger-scale attacks.

SC Media·
HIGHMalware & Ransomware

Phorpiex Botnet - Spreading Ransomware and Sextortion Tactics

The notorious Phorpiex botnet is back, spreading ransomware and sextortion schemes. Millions are at risk as it targets users globally. Stay alert and protect your devices from this evolving threat.

Cyber Security News·