Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

From Invitation to Infection: How SILENTCONNECT Delivers ScreenConnect

0
Medium
Published: Thu Mar 19 2026 (03/19/2026, 11:00:49 UTC)
Source: AlienVault OTX General

Description

A newly discovered loader called SILENTCONNECT is being used in active campaigns to silently install ScreenConnect, a remote monitoring and management tool, on victim machines. The infection chain begins with users being redirected to a Cloudflare Turnstile CAPTCHA page disguised as a digital invitation. Upon clicking, a VBScript file is downloaded, which retrieves and executes C# source code in memory using PowerShell. SILENTCONNECT employs various evasion techniques, including PEB masquerading and UAC bypass. The campaigns leverage trusted hosting providers like Google Drive and Cloudflare, and abuse living-off-the-land binaries. The loader has been active since March 2025 and poses a significant threat due to its stealthy nature and effectiveness.

AI-Powered Analysis

AILast updated: 03/19/2026, 13:53:42 UTC

Technical Analysis

SILENTCONNECT is a sophisticated malware loader identified in ongoing threat campaigns since March 2025. It primarily functions to silently deploy ScreenConnect, a legitimate remote monitoring and management (RMM) software, onto compromised endpoints. The infection vector begins with a social engineering tactic where victims are redirected to a Cloudflare Turnstile CAPTCHA page masquerading as a digital invitation. When users interact with this page, a VBScript file is downloaded and executed. This VBScript leverages PowerShell to dynamically retrieve and execute C# source code entirely in memory, avoiding writing malicious binaries to disk and thus evading traditional antivirus detection. SILENTCONNECT incorporates advanced evasion techniques such as Process Environment Block (PEB) masquerading, which manipulates process information to hide its presence, and User Account Control (UAC) bypass to gain elevated privileges without user consent. The campaign abuses trusted cloud hosting services like Google Drive and Cloudflare to host payloads, increasing the likelihood of bypassing network security filters. It also exploits living-off-the-land binaries (LOLBins) to execute malicious code, reducing its footprint and detection risk. Once ScreenConnect is installed, attackers gain persistent remote access to the victim system, enabling extensive control for espionage, data exfiltration, lateral movement, or deployment of additional malware. The campaign's use of phishing with credible-looking invitations and CAPTCHA challenges increases user interaction and infection success. Indicators of compromise include specific file hashes, IP addresses, and domains such as bumptobabeco.top and imansport.ir. The stealthy nature and effective privilege escalation techniques make SILENTCONNECT a significant threat to organizations relying on Windows environments.

Potential Impact

The deployment of SILENTCONNECT poses a substantial risk to organizations globally by enabling attackers to gain persistent, stealthy remote access via ScreenConnect. This access can lead to unauthorized data exfiltration, intellectual property theft, espionage, and disruption of business operations. The use of legitimate RMM software complicates detection and attribution, as malicious activity may blend with normal administrative tasks. The UAC bypass and in-memory execution techniques increase the likelihood of successful compromise even in environments with endpoint protection solutions. Organizations with remote workforce setups or those using ScreenConnect legitimately may face increased risk of credential theft or lateral movement within their networks. The abuse of trusted cloud services for payload hosting can bypass perimeter defenses, increasing infection rates. Overall, the threat can degrade confidentiality, integrity, and availability of critical systems, potentially causing financial loss, reputational damage, and regulatory consequences.

Mitigation Recommendations

1. Implement strict email and web filtering to block phishing attempts, especially those mimicking invitations or using CAPTCHA pages. 2. Monitor and restrict execution of VBScript and PowerShell scripts, particularly those that download and execute code in memory. Use PowerShell logging and enable script block logging to detect suspicious activity. 3. Employ application control or whitelisting to prevent unauthorized execution of living-off-the-land binaries and unknown scripts. 4. Enforce the principle of least privilege and configure UAC policies to limit privilege escalation opportunities. 5. Monitor network traffic for unusual connections to known malicious domains and IP addresses associated with SILENTCONNECT campaigns. 6. Regularly audit and monitor the use of legitimate RMM tools like ScreenConnect to detect unauthorized installations or anomalous usage patterns. 7. Use endpoint detection and response (EDR) solutions capable of detecting in-memory code execution and PEB masquerading techniques. 8. Educate users to recognize phishing lures and suspicious invitations, emphasizing caution before interacting with unexpected CAPTCHA challenges or download prompts. 9. Maintain up-to-date threat intelligence feeds and indicators of compromise (IOCs) to enhance detection capabilities. 10. Segment networks to limit lateral movement if a system is compromised.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.elastic.co/security-labs/silentconnect-delivers-screenconnect"]
Adversary
null
Pulse Id
69bbd761dff7b64814123d3f
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash281226ca0203537fa422b17102047dac314bc0c466ec71b2e6350d75f968f2a3
hash349e78de0fe66d1616890e835ede0d18580abe8830c549973d7df8a2a7ffdcec
hash81956d08c8efd2f0e29fd3962bcf9559c73b1591081f14a6297e226958c30d03
hash8bab731ac2f7d015b81c2002f518fff06ea751a34a711907e80e98cf70b557db
hashadc1cf894cd35a7d7176ac5dab005bea55516bc9998d0c96223b6c0004723c37
hashc3d4361939d3f6cf2fe798fef68d4713141c48dce7dd29d3838a5d0c66aa29c7
hash1b576ebba5b7bbd023eea1b15dac1ed3fb76a211

Ip

ValueDescriptionCopy
ip86.38.225.59

Url

ValueDescriptionCopy
urlhttp://imansport.ir/download_invitee.php
urlhttp://solpru.com/process/docusign.html
urlhttps://bumptobabeco.top/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest'

Domain

ValueDescriptionCopy
domainbumptobabeco.top
domainimansport.ir
domainsolpru.com
domaincheckfirst.net.au

Threat ID: 69bbfc73e32a4fbe5fc45109

Added to database: 3/19/2026, 1:38:59 PM

Last enriched: 3/19/2026, 1:53:42 PM

Last updated: 3/20/2026, 3:31:17 AM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses