Malware, Threat Intelligence, Phishing

New AsyncRAT campaign uncovered

Focus on malware

Malicious Python payloads and TryCloudflare tunnels have been used to facilitate AsyncRAT trojan delivery as part of a new malware campaign, according to The Hacker News.

Attacks commenced with the delivery of phishing emails with a Dropbox link that downloads a ZIP archive containing an internet shortcut file with a TryCloudflare URL that fetches an LNK file for further compromise, a report from Forcepoint X-Labs showed. Such an LNK file leads to PowerShell execution of a JavaScript code eventually resulting in the download of another ZIP archive with a Python payload for running AsyncRAT and other payloads. Such a campaign — which resembles previous attacks spreading AsyncRAT, Venom RAT, Remcos RAT, and XWorm, among others — "has again shown how hackers can use legitimate infrastructures like Dropbox URLs and TryCloudflare to their advantage. Payloads are downloaded through Dropbox URLs and temporary TryCloudflare tunnel infrastructure, thereby tricking recipients into believing their legitimacy," said researcher Jyotika Singh.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds