AsyncRAT Campaigns Uncovered: How Attackers Abuse ScreenConnect and Open Directories
Sept. 19, 2025, 6:42 p.m.
Description
This intelligence report details a sophisticated attack campaign leveraging trojanized ConnectWise ScreenConnect installers to deliver AsyncRAT payloads. Attackers use open directories as staging points, blending legitimate remote management software abuse with custom loaders and scripts. The campaign employs modular payload staging, native injection techniques, and extensive port/TLS manipulation to maintain resilient command and control infrastructure. Multiple hosts were identified serving similar malware packages, with evidence of payload repackaging and infrastructure rotation to evade detection. The attackers utilize dual execution pathways, aggressive persistence mechanisms, and multi-stage redirect chains to ensure successful compromise across diverse environments.
Tags
Date
- Created: Sept. 19, 2025, 4:05 p.m.
- Published: Sept. 19, 2025, 4:05 p.m.
- Modified: Sept. 19, 2025, 6:42 p.m.
Additional Informations
- Technology
- Telecommunications
- United States of America