In a significant finding, Forcepoint’s X-Labs research team has uncovered a new malware campaign that uses AsyncRAT, a notorious remote access trojan (RAT), along with Python scripting and TryCloudflare tunnels to deliver malicious payloads with enhanced stealth.
This campaign highlights an evolving trend of adversaries exploiting legitimate infrastructure to cloak their attacks, reinforcing predictions from recent cybersecurity insights.
AsyncRAT, known for its asynchronous communication capabilities, enables attackers to control compromised systems, exfiltrate sensitive data, and execute commands undetected.
In this campaign, adversaries utilize phishing emails, TryCloudflare URLs, and a series of chained obfuscated scripts to bypass security mechanisms and deliver their payload via Python-based modules.
The infection chain begins with a phishing email containing a Dropbox URL, which downloads a ZIP file.
This ZIP file includes an internet shortcut file (.URL) that redirects to a malicious TryCloudflare-hosted link.
The attack progresses through various stages:
load.py
) executes malicious shellcode contained in accompanying .BIN files. The Python script (load.py
) is at the heart of the campaign’s payload delivery mechanism.
It leverages the ctypes
library for functions like memory allocation, process creation, and code injection.
The attackers employ the “Early Bird APC Queue” injection technique, a sophisticated method that allows malicious code execution during the initialization phase of legitimate processes, thereby evading detection by traditional endpoint security solutions.
The payload communicates with its command-and-control (C2) servers at IP addresses such as 62.60.190.141
, operating over non-standard ports like 3232 and 4056.
These C2 channels facilitate data exfiltration and remote command execution, completing the attacker’s control over the infected host.
This campaign demonstrates how malicious actors weaponize legitimate platforms like Dropbox and TryCloudflare to create low-cost, high-efficacy attack chains.
By employing multiple layers of obfuscation, legitimate-looking files, and trusted infrastructure, the attackers effectively bypass traditional defenses.
ForcePoint research underscores the importance of multi-layered defenses and proactive threat intelligence.
As attacks leveraging low-cost, open infrastructure grow in sophistication, organizations must adopt advanced detection and mitigation techniques to stay ahead of emerging threats.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
Microsoft Threat Intelligence has exposed a novel cyberattack method employed by the North Korean state-sponsored…
Microsoft has confirmed the discovery of a significant zero-day vulnerability, tracked as CVE-2025-21418, in the Windows…
A critical vulnerability in Fortinet's FortiOS and FortiProxy products has been identified, enabling attackers to…
Fortinet’s FortiOS, the operating system powering its VPN and firewall appliances, has been found vulnerable…
A newly discovered 0-day vulnerability in Windows Storage has sent shockwaves through the cybersecurity community.…
A newly discovered malware, dubbed "Ratatouille" (or I2PRAT), is raising alarms in the cybersecurity community…