Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

New Malware Campaign Delivers Remcos RAT Through Multi-Stage Windows Attack

0
Low
Published: Tue Jan 13 2026 (01/13/2026, 09:08:00 UTC)
Source: The Hacker News

Description

Cybersecurity researchers have disclosed details of a new campaign dubbed SHADOW#REACTOR that employs an evasive multi-stage attack chain to deliver a commercially available remote administration tool called Remcos RAT and establish persistent, covert remote access. "The infection chain follows a tightly orchestrated execution path: an obfuscated VBS launcher executed via wscript.exe invokes a

AI-Powered Analysis

AILast updated: 01/14/2026, 01:57:51 UTC

Technical Analysis

The SHADOW#REACTOR malware campaign is a multi-stage attack designed to covertly deploy the commercially available Remcos RAT on Windows systems. The infection chain initiates with an obfuscated Visual Basic Script (win64.vbs) executed by wscript.exe, likely triggered by user interaction such as clicking a malicious link. This VBS script acts as a launcher for a Base64-encoded PowerShell payload that downloads fragmented, text-based payload files (qpwoe64.txt or qpwoe32.txt) from a remote server into the %TEMP% directory. The PowerShell script validates the completeness of these fragments through size and existence checks, implementing a self-healing mechanism that retries downloads to avoid chain failure. Once validated, the fragments are reconstructed into a secondary PowerShell script (jdywa.ps1), which invokes a .NET Reactor-protected reflective loader. This loader incorporates anti-debugging and anti-virtual machine checks to evade detection and analysis. It establishes persistence and fetches the final Remcos RAT payload, which is executed using MSBuild.exe, a legitimate Microsoft binary, to avoid raising suspicion. Additional wrapper scripts ensure the initial VBS launcher can be re-triggered to maintain persistence. The campaign's modular and obfuscated design, use of text-only intermediates, and living-off-the-land techniques complicate static detection and sandbox analysis. The attackers appear to be initial access brokers targeting a broad range of organizations, including enterprises and SMBs, for financial gain, though no direct attribution to known threat groups exists. The campaign does not exploit a specific vulnerability but relies on social engineering and user interaction to initiate the infection.

Potential Impact

For European organizations, the SHADOW#REACTOR campaign poses a risk of unauthorized remote access, data exfiltration, espionage, and potential lateral movement within networks. The use of Remcos RAT enables attackers to control compromised systems covertly, potentially leading to intellectual property theft, disruption of business operations, and exposure of sensitive information. Enterprises and SMBs are at risk due to the opportunistic nature of the campaign and the widespread use of Windows systems. The stealthy multi-stage infection chain and living-off-the-land tactics make detection challenging, increasing the likelihood of prolonged undetected presence. Persistent access could facilitate follow-on attacks such as ransomware deployment or supply chain compromise. Although currently assessed as low severity, the campaign's modularity and evasive techniques could enable escalation or adaptation to more damaging payloads, especially in high-value sectors such as finance, manufacturing, and critical infrastructure prevalent in Europe.

Mitigation Recommendations

European organizations should implement targeted mitigations beyond generic advice: 1) Deploy advanced endpoint detection and response (EDR) solutions capable of detecting obfuscated scripts, in-memory execution, and LOLBin abuse, specifically monitoring wscript.exe, PowerShell, and MSBuild.exe activities. 2) Enforce strict application whitelisting and restrict execution of scripts and living-off-the-land binaries to authorized users and processes. 3) Implement network segmentation and monitor outbound connections for anomalous traffic to known malicious servers or unusual data exfiltration patterns. 4) Conduct user awareness training focused on recognizing social engineering lures that trigger script execution. 5) Utilize script-blocking policies via Group Policy Objects (GPO) to limit or disable execution of VBS and PowerShell scripts unless explicitly required. 6) Regularly audit and harden persistence mechanisms, including scheduled tasks and startup scripts, to detect and remove unauthorized entries. 7) Employ threat hunting to identify indicators of compromise related to Remcos RAT and the SHADOW#REACTOR infection chain. 8) Maintain up-to-date threat intelligence feeds to track emerging variants and adjust defenses accordingly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/01/new-malware-campaign-delivers-remcos.html","fetched":true,"fetchedAt":"2026-01-14T01:56:41.144Z","wordCount":1130}

Threat ID: 6966f7db8330e06716c60392

Added to database: 1/14/2026, 1:56:43 AM

Last enriched: 1/14/2026, 1:57:51 AM

Last updated: 2/5/2026, 10:25:04 AM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats