AsyncRAT Delivered via ScreenConnect in New Fileless Attack Campaign

Hackers Abuse ScreenConnect in Fileless AsyncRAT Campaign to Steal Credentials and Crypto Data

  • Certain threat actors are misusing ConnectWise ScreenConnect, a legitimate remote monitoring tool, to access target systems and deploy Malware.
  • Cybersecurity researchers observed attackers delivering AsyncRAT, a remote access trojan, using fileless malware techniques to steal sensitive data.
  • Initial access was achieved by sending fraudulent ScreenConnect installers disguised as business documents in phishing emails.
  • The campaign uses complex scripts and scheduled tasks to maintain presence on infected machines and evade detection.
  • Stolen data, including credentials and information on crypto wallets, is sent to a remote server controlled by the attackers.

Attackers are exploiting ConnectWise ScreenConnect to gain unauthorized access to computers as part of a new campaign, according to findings published by cybersecurity researchers on September 11, 2025. The goal is to deliver a remote access trojan called AsyncRAT in order to steal data from compromised devices.

- Advertisement -

Analysts at LevelBlue reported that the attackers use phishing emails containing malicious ScreenConnect installers that appear to be financial or business-related files. After establishing remote access, the attackers manually deploy a series of scripts and software components without leaving obvious files on the system’s disk, making detection much more difficult.

According to an official report from LevelBlue, the attackers run a layered Visual Basic Script and PowerShell loader. “The attacker used ScreenConnect to gain remote access, then executed a layered VBScript and PowerShell loader that fetched and ran obfuscated components from external URLs,” the researchers said. The process ultimately unpacks AsyncRAT and maintains ongoing access by setting up a fake “Skype Updater” task.

The malware retrieves two main files—“logs.ldk” and “logs.ldr”—from an attacker-controlled server. The first file writes a new script for persistent access, while the second is used to launch AsyncRAT. This trojan sends user keystrokes, browser logins, and details of installed cryptocurrency wallet applications (like those used in Chrome, Brave, Edge, Opera, and Firefox) back to a command-and-control server.

All communication and stolen data are sent over a direct internet connection to the attackers’ remote server, with configuration details either built into the code or loaded from a remote Pastebin page. The researchers explained that fileless malware, which operates in a computer’s memory instead of saving files on disk, is especially difficult to detect and remove.

- Advertisement -

The technique relies on trusted system tools and remote access programs, highlighting the challenges that organizations face in defending against fileless malware attacks.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Ethereum Whales Accumulate $862M: Is a Major Price Surge Ahead?

Large Ethereum holders, known as whales, purchased $862 million in ETH within six hours. Ten...

Ohio Approves Crypto Payments for State Fees, Eyes Bitcoin Reserve

Ohio will allow cryptocurrency payments for state fees and services following a unanimous board...

Gate Launches Ethereum-Compatible Layer 2, Revamps GT Token

Gate has introduced Gate Layer, a new Layer 2 blockchain to raise transaction speeds...

FalconX Launches First Forward Rate Contracts for Ethereum Staking

FalconX completed the first forward rate agreements based on the Treehouse Ethereum Staking Rate. The...

Oracle to Operate TikTok US Algorithm as Takeover Deal Nears Completion

A potential agreement is nearing that would move control of TikTok’s U.S. operations to...
- Advertisement -

Must Read

Top 11 Hosting Providers To Buy VPS With Bitcoin And Cryptocurrency

As a full-time blogger with over 5 years of experience and running multiple niche websites, I have gained the necessary expertise when it comes...