A sophisticated malware campaign targeting South Korean users has emerged, distributing the Remcos remote access trojan (RAT) through deceptive installers disguised as legitimate VeraCrypt encryption software.
This ongoing attack campaign primarily focuses on individuals
connected to illegal online gambling platforms, delivering malware through
web browsers and messaging platforms like Telegram.
Once executed, the fake installers deploy
malicious VBS scripts hidden within their resource sections.
These scripts are written to the system’s temporary directory.
The malware then initiates a
complex infection chain involving multiple stages of obfuscated VBS and PowerShell scripts, ultimately delivering the Remcos RAT payload.
Remcos RAT is equipped with extensive
data theft capabilities including keylogging, screenshot capture, webcam and microphone control, and credential extraction from web browsers.
Fake VeraCrypt installers are spreading Remcos RAT in South Korea, mainly targeting online gamblers but also risking normal users.
cybersecuritynews.com