Netcrook Logo
👤 BYTEHERMIT
🗓️ 11 Sep 2025  

Phantom Hands: How AsyncRAT Hijacked ScreenConnect to Rob Crypto and Credentials

Cybercriminals covertly abused trusted remote software to steal passwords and digital wallets in a new, stealthy wave of fileless attacks.

Fast Facts

  • Attackers used ConnectWise ScreenConnect, a legitimate IT tool, to deliver AsyncRAT malware.
  • Phishing emails disguised as business documents lured victims into installing the trojanized software.
  • The malware ran "fileless" by mainly operating in computer memory, making it hard to detect.
  • AsyncRAT stole browser passwords, system information, and scanned for cryptocurrency wallets.
  • Stolen data was sent to a remote command-and-control server for further exploitation.

Remote Control Turned Rogue

Imagine a burglar slipping in through the front door using the homeowner’s own key. That’s the essence of a sophisticated cyberattack recently uncovered, where hackers exploited ConnectWise ScreenConnect - a trusted tool for IT support - to silently infiltrate computers and plunder digital valuables. Instead of brute-forcing their way in, the intruders masqueraded as business partners, sending phishing emails bearing what appeared to be routine documents but were, in fact, laced with malicious intent.

Once a victim installed the trojanized ScreenConnect, the attackers gained hands-on remote access. From there, they unleashed a complex chain of scripts - first Visual Basic, then PowerShell - to pull down hidden malware components from external servers. These components, heavily disguised and encrypted, ultimately unpacked into AsyncRAT, a remote access trojan known for its ability to spy, steal, and persist on infected machines.

Fileless: The Invisible Threat

What makes this campaign especially dangerous is its "fileless" nature. Traditional malware leaves traces on disk - like footprints in the mud. Fileless attacks, however, stay mostly in memory, acting like ghosts that vanish when the computer is restarted or the process ends. This makes them far more difficult for antivirus tools to spot or for investigators to analyze.

In this attack, persistence was achieved by disguising a scheduled task as a “Skype Updater,” ensuring the malware survived reboots and kept running in the background. AsyncRAT then set to work, logging keystrokes, stealing browser credentials, and scouring the system for cryptocurrency wallets - across browsers like Chrome, Brave, Edge, Opera, and Firefox. All this loot was quietly funneled back to a remote server, ready for the criminals to exploit or sell.

Wider Context: A Growing Trend

This is not the first time remote management tools have been turned against their users. Similar attacks in recent years have weaponized legitimate platforms like TeamViewer and AnyDesk, exploiting their trusted status to evade suspicion. The proliferation of fileless malware, as highlighted in reports by LevelBlue and other security firms, reflects a broader shift in cybercrime: attackers increasingly blend in with normal system activity, using everyday tools as camouflage.

The targeting of cryptocurrency wallets adds a market-driven twist - digital coins are fast, untraceable, and highly valuable. As global adoption of both remote work and digital currencies grows, so too does the appeal for cybercriminals seeking quick, anonymous profits.

In the digital age, even the most trusted tools can become double agents. As attackers grow ever more cunning, organizations and individuals alike must rethink what it means to trust - and how to defend against threats that hide in plain sight.

WIKICROOK

  • Remote Access Trojan (RAT): A Remote Access Trojan (RAT) is malware that lets attackers secretly control a victim’s computer from anywhere, enabling theft and spying.
  • Fileless Malware: Fileless malware is malicious software that runs in a computer’s memory, avoiding disk storage and making it difficult for traditional security tools to detect.
  • Phishing: Phishing is a cybercrime where attackers send fake messages to trick users into revealing sensitive data or clicking malicious links.
  • Persistence: Persistence involves techniques used by malware to survive reboots and stay hidden on systems, often by mimicking legitimate processes or updates.
  • Command: A command is an instruction sent to a device or software, often by a C2 server, directing it to perform specific actions, sometimes for malicious purposes.

BYTEHERMIT BYTEHERMIT
Air-Gap Reverse Engineer
← Back to news