Summarize with:

Share
In March 2026, NCC Group and FOX-IT disclosed that an unknown threat actor had been running an AsyncRAT-linked software-download campaign since at least October 2025, using fake sites for more than 25 popular applications to trick users into installing malware. The operation abused ScreenConnect for initial remote access, then delivered AsyncRAT through a VBScript and PowerShell chain that ended with process hollowing into RegAsm.exe.
For defenders, the key takeaway is simple: this is not just malicious SEO. It is a full intrusion chain that combines social engineering, trusted tooling, persistence, and post-install surveillance. Any environment that sees suspicious ScreenConnect installs after unofficial software downloads should be treated as a likely compromise and investigated through digital forensics and threat intelligence workflows.
RegAsm.exe, establishing persistent command-and-control.The campaign primarily affects Windows users who download software from search results instead of verified vendor domains. That risk extends beyond home users. Enterprise users, contractors, and admins often fetch utilities such as media players, hardware tools, packaging tools, and system helpers from the web, which creates a practical exposure path inside business environments.
Based on the lure catalog described by NCC Group, likely exposure is highest where users are allowed to:
Because the operator used fake portals for widely searched software, sector exposure is broad rather than industry-specific.
This operation is best understood as a software-trust attack that blends SEO poisoning with staged malware delivery.
| Stage | Technique | Detail |
|---|---|---|
| Initial lure | SEO poisoning | Fake software sites rank for popular app searches |
| Delivery | Tokenized download backend | Unique URLs reduce the value of URL-level blocking |
| Execution | DLL sideloading | A malicious libvlc.dll runs when the victim launches the bundled app |
| Foothold | Legitimate RMM abuse | ScreenConnect is silently installed for unattended access |
| Staging | Script-based loader | VBScript writes files, then hidden PowerShell decodes and loads components |
| Execution | Process hollowing | AsyncRAT is injected into RegAsm.exe |
| Actions on objectives | Surveillance and theft | Keylogging, clipboard capture, crypto clipping, plugin-based extension |
| Tactic | Technique | ID |
|---|---|---|
| Resource Development | SEO Poisoning | T1608.006 |
| Privilege Escalation / Defense Evasion | DLL Search Order Hijacking | T1574.001 |
| Execution | Command and Scripting Interpreter | T1059 |
| Defense Evasion | Process Injection / Hollowing | T1055 |
| Persistence | Scheduled Task / Run Key | T1053 / T1060 |
| Command and Control | Encrypted channel over TLS | T1071 |
vlc-media[.]com, studio-obs[.]net, kms-tools[.]com, crosshairx[.]profileget[.]loseyourip[.]com and direct-download[.]giize[.]comr.servermanagemen[.]xyz:8041hone32[.]work[.]gd and mora1987[.]work[.]gdconfing_me_s%AppData%\Keyboard\%ProgramFiles%\Windows Service\Look for the following chain on the same host within a short time window:
WScript.exe launching hidden PowerShell,RegAsm.exe spawning or exhibiting injected code behavior,MasterPackager.Updater or suspicious Run key persistence.kqlDeviceProcessEvents | where FileName in~ ("wscript.exe","powershell.exe","regasm.exe","msiexec.exe") | where ProcessCommandLine has_any ("ScreenConnect", "installer_method2_fso.vbs", "cap.ps1", "MasterPackager.Updater", "Windows Service") | project Timestamp, DeviceName, FileName, ProcessCommandLine, InitiatingProcessFileName, InitiatingProcessCommandLine | order by Timestamp desc
Prioritize detections for:
Organizations with mature endpoint detection and response coverage should correlate process, script, registry, and network events rather than relying on one IOC alone.
%ProgramFiles%\Windows Service\.WScript.exe, hidden PowerShell, and suspicious RegAsm.exe activity on impacted hosts.MasterPackager.Updater and inspect HKCU\Software\Microsoft\Windows\CurrentVersion\Run.This campaign matters because it sits in the uncomfortable middle ground between classic malware delivery and software supply-chain trust abuse. The vendor software itself was not reported as compromised, but the attacker exploited the user expectation that “download” results from search engines are safe enough.
Three things stand out:
In practical terms, defenders should treat unofficial software-download events as potential intrusion precursors, not just policy violations.
It is an intrusion campaign in which fake software-download sites trick users into installing malicious packages that ultimately deploy AsyncRAT.
The NCC Group report does not describe a vendor-side compromise. The attack abused impersonation sites and bundled malware around expected software.
ScreenConnect gave the operator a legitimate-looking remote access foothold before AsyncRAT was deployed.
Start with unauthorized ScreenConnect installations, suspicious WScript.exe and PowerShell chains, and outbound connections to the listed relay or C2 infrastructure.
No. Any enterprise with users downloading tools from search results can be exposed, especially on endpoints without strong application control.
It reduces the usefulness of simple URL blocking because each victim can receive a different path, making domain- and behavior-based detection more important.
NCC Group highlighted its cryptocurrency clipper, geofencing logic, and dynamic plugin capability in addition to the usual remote access features.
Written by
Research
A DevOps engineer and cybersecurity enthusiast with a passion for uncovering the latest in zero-day exploits, automation, and emerging tech. I write to share real-world insights from the trenches of IT and security, aiming to make complex topics more accessible and actionable. Whether I’m building tools, tracking threat actors, or experimenting with AI workflows, I’m always exploring new ways to stay one step ahead in today’s fast-moving digital landscape.
Get the latest cybersecurity insights in your inbox.
Threat Hunting & IntelClayRat: Android spyware operation collapses after arrest | 2026 Executive Summary ClayRat is an Android spyware operation that targeted users in Russia and app...
Threat Hunting & IntelNamibia Airports Company breach claim raises admin-access risk | 2026 Executive Summary Namibia Airports Company (NAC) disclosed that it detected a cybersecurit...
Threat Hunting & IntelGlassWorm Shifts to Transitive Open VSX Dependencies in Developer Supply-Chain Push GlassWorm is no longer just a story about obviously malicious extensions. Th...